Cybersecurity Analytics for the Enterprise Environment: A Systematic Literature Review
Abstract
:1. Introduction
2. Delving into Security Analytics
3. Research Methodology
- RQ1: How has the adoption of security analytics in enterprises evolved over time?
- RQ2: In which industries, fields, domains, or sectors are enterprises most actively adopting and utilizing security analytics?
- RQ3: What techniques, methods, models, and frameworks are enterprises employing to implement and optimize security analytics?
- RQ4: Which data sources and data types are integral to security analytics within an enterprise context?
- RQ5: What are the barriers faced by enterprises in implementing security analytics?
- RQ6: What are the research gaps and future research opportunities in enterprise security analytics?
3.1. Identification
- Inclusion Criteria included
- −
- InC01. Studies published in the last ten years, between 2013 and 2023;
- −
- InC02. Studies published in conferences and journals;
- −
- InC03. Studies that are written in English.
- Exclusion Criteria included
- −
- ExC01. Studies published before 2013;
- −
- ExC02. Studies that are published in non-peer-reviewed sources;
- −
- ExC03. Studies that are not written in English;
- −
- ExC04. Studies published in preprint platforms;
- −
- ExC05. Studies for which the full text is not available;
- −
- ExC06. Studies in which none of the phrases from the above searching groups were included in the title or abstract;
- −
- ExC07. Studies that are a survey or a review.
3.2. Study Selection Process
3.2.1. Screening Stage (Title and Abstract Review)
- Relevance Question 1 (RQ1screen): Does the title or abstract contain keywords from both our first search group (cybersecurity/security analytics terms) AND our third search group (enterprise context terms)?
- Relevance Question 2 (RQ2screen): Does the title or abstract indicate that the study’s primary focus is on security analytics specifically for an enterprise, organizational, or business context?
3.2.2. Eligibility Stage (Full-Text Review)
- Relevance Question 3 (RQ3full-text): Based on the full text, does the study substantively address security analytics within an enterprise context, providing insights relevant to our research questions (e.g., regarding techniques, frameworks, data, challenges, or future directions)?
3.2.3. Backward and Forward Searches (Snowballing)
3.2.4. Quality Appraisal
- Clarity of Contribution: the extent to which the study’s objectives, methodology, and findings were clearly presented and understandable.
- Sufficiency of Detail: whether the study provided adequate detail to allow for the extraction of relevant data pertaining to our review’s specific research questions (e.g., on techniques, frameworks, data sources, and challenges).
- Direct Contribution to Review Objectives: the degree to which the study made a discernible and substantive contribution to the understanding of enterprise security analytics in line with the aims of this review.
3.3. Characteristics of Included Studies
4. Results and Analysis
4.1. The Adoption and Evolution of Security Analytics in Enterprises (RQ1)
- Elaboration and Evidence: Enterprises are confronted with an increasingly dynamic threat environment, characterized by the evolving behaviors of malicious actors [31] and the diverse impacts of varying attack vectors [32]. A significant accelerator in this context is the documented surge in APTs, which are designed to bypass conventional defenses [33]. Compounding this, traditional security methodologies often fail to adequately translate high-level security needs into concrete, implementable security requirements [34]. Furthermore, a recurrent theme is that existing security solutions are frequently not designed holistically, leading to fragmented defenses [35]. The inherent complexity and continuous changeability of modern business processes further exacerbate these vulnerabilities [36].
- Analysis: The failure of legacy systems to counter advanced threats effectively creates significant security gaps, exposing organizations to severe financial, operational, and reputational damage. This necessitates a fundamental shift from purely reactive defense postures to strategies emphasizing proactive threat anticipation and predictive analytics. The core implication is the urgent need for security analytics solutions capable of discerning complex attack patterns, identifying subtle anomalies indicative of compromise [37], and adapting dynamically to new adversarial techniques. This also calls for proactive breach detection mechanisms [38].
- Trends and Challenges: This driver directly fuels the industry-wide transition towards AI-powered techniques, particularly machine learning and deep learning, for advanced threat detection, behavioral analysis, and predictive security. Key technological trends responding to this include the development of sophisticated Security Information and Event Management (SIEM) systems, Endpoint Detection and Response (EDR), and Network Detection and Response (NDR) solutions that leverage these analytical capabilities [39]. However, a significant challenge lies in developing and maintaining analytics models that can keep pace with the rapid evolution of adversarial Tactics, Techniques, and Procedures (TTPs) and the sheer volume of threat intelligence [40].
- Elaboration and Evidence: A consistent theme in the literature is the organizational need for security approaches that offer high performance and enhanced efficiency [41]. This is often championed by decision makers who are tasked with integrating security analytics into the overarching business strategy [42], a process that inherently involves navigating the challenge of balancing robust security measures with budgetary constraints [43]. The dynamic nature of business operations also demands more agile and responsive security frameworks [36].
- Analysis: In the contemporary enterprise, cybersecurity is increasingly viewed not merely as an IT overhead but as a critical enabler of business continuity, trust, and innovation. Inefficient or overly costly security measures can drain resources, impede agility, and ultimately hinder competitive advantage. The core implication is a demand for security analytics that not only improve threat detection and response times but also optimize security operations, automate routine tasks, and provide clear metrics to demonstrate value and inform strategic investment decisions.
- Trends and Challenges: These business drivers are accelerating the adoption of Security Orchestration, Automation, and Response (SOAR) platforms, which aim to streamline security workflows by integrating analytics with automated response actions [44]. The pursuit of efficiency also encourages the use of cloud-native security analytics platforms that offer scalability and potentially lower total cost of ownership. Challenges in this domain include effectively quantifying the return on investment (ROI) for security analytics, ensuring that automated responses do not inadvertently disrupt business processes, and seamlessly integrating security analytics into diverse and often siloed enterprise IT environments [13].
- Elaboration and Evidence: Enterprises today must contend with analyzing vast volumes of often unstructured or semi-structured data, such as text logs from myriad systems [45], and navigate the inherent security risks associated with managing these large-scale Big Data environments [46]. A common operational pain point is the high number of false positive alerts generated by simpler tools and the extensive analysis times required when dealing with heterogeneous data sources [47]. Concurrently, with the growing reliance on machine learning (ML) for various business functions, there is a corresponding need for robust security analyses specifically tailored for, and sometimes applied to, these ML systems themselves [48].
- Analysis: The mere collection and storage of massive datasets provide little security value without the ability to extract timely, actionable intelligence. The inability to effectively process and analyze this “data deluge” can lead to missed critical alerts, delayed incident response, and significant analyst fatigue. This underscores a critical demand for advanced data-processing architectures, scalable analytical platforms, and the application of sophisticated models (including ML and deep learning (DL)) capable of uncovering hidden patterns and anomalies within complex datasets. The goal is to transform raw security data into strategic insights.
- Trends and Challenges: This directly underpins the widespread move towards dedicated Big Data security analytics platforms, often leveraging cloud infrastructure for its scalability and processing power. The application of ML/AI for User and Entity Behavior Analytics (UEBA), advanced threat hunting, and fraud detection are prominent examples of this trend. However, significant challenges persist, including ensuring data quality and consistency from diverse sources, the “black-box” nature of some ML models (driving research into Explainable AI for security), the persistent shortage of cybersecurity professionals with data science skills, and the need to make complex analytics outputs more accessible and user-friendly, potentially through advanced visual tools [49].
- Elaboration and Evidence (Cloud Computing): The migration to cloud computing for security analytics reflects broader enterprise adoption driven by the pursuit of operational efficiency, scalability, and perceived cost-effectiveness [46,52,53,54,55,56,57,58,59]. As organizations increasingly entrust their data and applications to cloud environments, significant practical concerns regarding the comprehensive protection of sensitive assets against sophisticated external and internal threats emerge [53]. These concerns, such as ensuring data privacy and meeting complex compliance mandates in shared infrastructures, understandably lead some clients to hesitate in relocating their most sensitive data to the cloud [53]. This evolving landscape has spurred significant interest in leveraging dedicated cloud-native security analytics to detect complex attacks within virtualized and containerized infrastructures [56]. Modern cloud-based security analytics solutions offer the technical ability to ingest and analyze vast data volumes from diverse, distributed sources—including network logs, endpoint data, and cloud application telemetry—often in near real time to support rapid threat detection and response [38,60].
- Elaboration and Evidence (Big Data): Concurrent with, and often underpinning cloud adoption, the strategic focus in security analytics has decisively broadened from rudimentary data storage to the advanced processing and contextual analysis of “Big Data”. This practically entails managing and deriving actionable intelligence from the escalating volume, velocity, and variety of security-relevant data streams [37,46,56,57,60,61,62,63,64,65,66,67,68]. Enterprises now recognize that robust Big Data capabilities are not merely advantageous but practically indispensable for identifying subtle attack patterns, anomalous behaviors, and complex correlations across heterogeneous datasets that may indicate sophisticated security breaches or ongoing, low-and-slow attacks [37].
- Analysis: Cloud computing provides the elastic, dynamically scalable, and potentially cost-effective infrastructural backbone essential for resource-intensive security analytics operations. Simultaneously, Big Data technologies furnish the critical tools and platforms to ingest, efficiently store, and process the massive and diverse datasets required for achieving comprehensive threat visibility and enabling deep forensic capabilities. Their synergy facilitates a crucial shift from traditionally siloed, often capacity-constrained, on-premises security monitoring paradigms towards more centralized, scalable, and potentially more effective enterprise-wide analytics. The foremost practical implication is the enhanced ability to perform significantly deeper, broader, and more context-aware analyses than previously feasible, thereby laying the critical groundwork for more intelligent and proactive security operations. However, realizing this potential practically requires significant upfront planning for data governance, security, and cost management, alongside the development of new skill sets within security teams to manage and leverage these complex, distributed environments. The transition also introduces limitations such as increased dependency on provider infrastructure and the potential for new attack surfaces specific to cloud and Big Data platforms if not adequately secured.
- Trends and Challenges: This foundational layer of cloud and Big Data infrastructure supports the deployment of advanced SIEM systems, the creation of security data lakes for flexible analytics, and the adoption of cloud-native security monitoring and response tools. However, its real-world application is fraught with persistent practical challenges and limitations that enterprises must navigate.
- −
- Data Security, Sovereignty, and Compliance: Managing data security and ensuring sovereignty in multi-cloud or hybrid environments presents significant operational complexity, particularly for global enterprises facing differing regional data protection regulations (e.g., GDPR, CCPA) [53]. Ensuring compliance when data traverses multiple jurisdictions or is managed by third-party providers requires robust contractual agreements and continuous auditing, which can be resource-intensive.
- −
- Data Quality, Integration, and Interoperability: Ensuring high data quality and achieving seamless interoperability among diverse security data sources (e.g., legacy systems, modern IoT devices, and cloud services) remains a major hurdle [37]. Poor data quality can lead to inaccurate analytics and an increase in false positives, diminishing trust in the system. The lack of standardized data formats (an issue addressed by initiatives like SysFlow) often necessitates complex and costly data integration efforts, diverting resources from actual analysis.
- −
- Cost Management and Control: While the cloud can offer cost-effectiveness, enterprises face challenges in controlling escalating data storage volumes, processing workloads, and, in particular, network egress fees. The specialized nature of many advanced analytics tools and platforms also adds to licensing and operational costs, requiring careful financial planning and justification of ROI.
- −
- Specialized Skills Gap: A critical practical limitation is the pervasive shortage of personnel possessing the requisite blend of skills in cybersecurity, cloud engineering, Big Data analytics, and data science needed to design, deploy, manage, and interpret the outputs of these complex ecosystems effectively [56]. This skills gap can significantly delay adoption or limit the utility of implemented solutions.
- −
- Actionable Insights from Data: While the infrastructure facilitates the collection and processing of vast data, including web-based sources [63,69], a key challenge lies in transforming this data into genuinely actionable insights for security teams. Advanced visualization and user-centered design of analytics interfaces [49,53] are crucial for enabling analysts to effectively explore data, understand alerts, and make timely decisions, but developing such interfaces requires specific expertise and iterative refinement.
- Elaboration and Evidence (Machine Learning): As a core subset of AI, ML has emerged as a demonstrably powerful approach through which to address the formidable challenge of extracting meaningful and actionable insights from the large, diverse, and complex datasets generated within modern enterprise environments [41,60,70]. ML algorithms are designed to automatically uncover intricate patterns, learn from historical security data (including both malicious and benign activities), and identify subtle anomalies that may deviate from established normal behavior, proving particularly effective when applied to large-scale datasets [47,71,72]. A key practical advantage over traditional, static rule-based systems, which can quickly become outdated and ineffective against rapidly evolving cyber threats [73], is the ability of ML models to be continuously updated and retrained. This adaptability enables them to potentially detect emerging threats and novel attack patterns for which explicit signatures do not yet exist. ML is especially crucial for advancing predictive analytics capabilities within enterprises, allowing them to move beyond reactive defense by anticipating potential security threats and proactively implementing targeted defensive measures [37,38,48,49,58,66,74,75,76]. This transition represents a natural and necessary progression in maximizing the strategic value of security-related data for enhanced enterprise defense [56].
- Elaboration and Evidence (Deep Learning): DL, a more advanced and specialized subset of ML (and thus AI), represents a further cutting edge in the evolution of security analytics, as evidenced by its application in several reviewed studies targeting complex security challenges [57,65,77,78,79,80]. DL models, such as multi-layered neural networks, have demonstrated superior performance, particularly in handling highly complex, high-dimensional, and often unstructured or semi-structured data types prevalent in cybersecurity (e.g., raw network packet data, system call sequences, and free-text incident logs) [65,78]. A significant practical benefit of many DL architectures is their inherent ability to perform automatic feature extraction from raw data. This alleviates the need for manual feature engineering, which is often a complex, time-consuming, and expertise-intensive task for security analysts. With sufficient relevant data for training, DL techniques can achieve higher accuracy and better generalization than many traditional ML methods [77]. This enhanced accuracy is critically important in the security domain, where the consequences of both false positives (leading to alert fatigue and wasted investigative effort) and false negatives (resulting in missed detections of actual threats) can be severe for an enterprise [57]. The capacity of DL models to continuously learn and adapt from new data makes them particularly effective for developing proactive, predictive, and dynamic security analytics solutions capable of addressing novel and evolving adversarial tactics [79,80].
- Analysis: The integration of AI, encompassing both ML and DL, into enterprise security analytics signifies a fundamental paradigm shift. It propels security operations beyond merely detecting known, signatured threats towards the more ambitious goals of identifying “unknown unknowns”—previously unseen attack patterns or vulnerabilities—and anticipating future adversarial campaigns. A core practical implication for enterprises is the empowerment of their security teams to adopt a more proactive stance, which can lead to tangible benefits such as reduced incident response times, minimized breach impact, and a stronger overall security posture. The capability of these AI-driven technologies to analyze security-related data at a scale and speed far surpassing human analytical capabilities is transformative for Security Operations Centers (SOCs), enabling them to better cope with the overwhelming volume of modern security telemetry. However, this transformative potential comes with practical limitations and considerations. While AI can enhance autonomy, its deployment necessitates robust validation processes and human oversight to prevent erroneous automated actions that could disrupt critical business operations or lead to misallocation of security resources. Furthermore, the promise of identifying “unknown unknowns” requires careful management of expectations, as the discovery and validation of genuinely novel threats remain complex and resource-intensive, with a persistent risk of misinterpreting anomalies.
- Trends and Challenges: This intelligence layer is increasingly driving the development and adoption of advanced security technologies such as UEBA, sophisticated Network Traffic Analysis (NTA) solutions, SOAR platforms, and next-generation antivirus/endpoint protection (NGAV/EPP) systems. However, the widespread and effective adoption of AI in enterprise security is not without significant practical challenges and limitations:
- −
- Data Requirements and Quality: A primary hurdle is the critical need for large volumes of high-quality, relevant, and appropriately labeled datasets for training effective supervised ML and DL models. In practice, acquiring, preparing, and maintaining such datasets is a substantial undertaking for most enterprises, demanding significant investment in data infrastructure, governance, and specialized personnel. The scarcity of labeled data for novel or zero-day attacks poses a particular challenge for supervised learning paradigms.
- −
- The “Black-Box” Problem: The “black-box” nature of many complex ML/DL models, where the reasoning behind their predictions is not easily understandable by human analysts, presents a serious real-world limitation [81]. This lack of interpretability can hinder trust, slow down adoption, and make it difficult for SOC analysts to validate alerts or for engineers to debug and refine models, potentially leading to critical alerts being overlooked or misunderstood.
- −
- Adversarial AI Attacks: ML models themselves can be targets of sophisticated adversarial attacks (e.g., data poisoning and evasion attacks), where attackers manipulate input data to cause misclassification or evade detection. This vulnerability is a growing practical concern for enterprises, as it means that AI-driven security systems can be subverted, undermining their reliability and effectiveness.
- −
- Specialized Skills Gap: There remains a significant and persistent skills gap. Data scientists and ML engineers who also possess deep cybersecurity domain expertise are lacking [81]. Practically, this means many enterprises struggle to hire, develop, and retain the talent necessary to build, deploy, manage, and critically evaluate these advanced AI-driven security analytics solutions, often leading to reliance on third-party vendors or underutilization of the technology’s potential.
- −
- Integration and Operationalization Complexity: Integrating advanced AI analytics into existing security workflows and IT infrastructure can be complex and disruptive. Ensuring that AI-generated insights are effectively operationalized—that is, translated into timely and appropriate security actions—requires careful planning, process re-engineering, and often, significant changes to existing SOC procedures.
- Elaboration and Evidence: A holistic approach to security analytics, as conceptualized within the reviewed literature, intentionally transcends purely technical threat detection. It advocates for an integrated methodology that systematically considers multiple organizational perspectives and critical influencing factors. In practice, this involves extending the purview of security analytics beyond the mere identification of technical vulnerabilities to also critically examine the intricate workings of core business processes, including their operational efficiency drivers [38,84], overarching strategic corporate objectives, and the continuously evolving regulatory compliance landscapes [34,85]. A recurring theme in the reviewed studies is that as business processes inevitably grow in complexity—driven by rapid technological advancements (e.g., the proliferation of interconnected IoT devices and sprawling cloud service dependencies) and dynamic market demands—the enterprise attack surface and potential threat vectors consequently become more multifaceted and deeply embedded within these operational processes [31,32,33,86]. This escalating complexity necessitates a security strategy that is not only comprehensive in its coverage but also inherently adaptive to change. The literature suggests that adopting such a holistic approach provides a vital context-centric perspective [57], thereby enabling the development and deployment of security measures that are more precisely tailored to unique business needs and specific risk appetites.It is important to note a key observation from our review: while the surveyed literature strongly and consistently advocates for the need for holistic security analytics, and several studies propose valuable conceptual frameworks or models aiming in this direction, there is a less pronounced emphasis on empirical studies that rigorously validate the superior effectiveness or measurable ROI of specific, named holistic frameworks when compared directly with more traditional, purely technical security solutions within diverse enterprise settings. This suggests a significant practical gap and a crucial area for future research focused on the demonstrable implementation benefits and quantifiable outcomes of comprehensive holistic models.
- Analysis: The core critique of traditional, siloed security analytics is its inherent practical limitation, that is, a tendency to generate a narrow, technically focused view of risk that is often disconnected from the actual or potential business impact. In real-world terms, this disconnect can lead to misaligned security controls (e.g., over-investing in low-impact areas while under-resourcing critical business functions), inefficient allocation of scarce security resources, unintended disruption to critical business operations during incident response, and, ultimately, a diminished overall security posture despite significant technical efforts. Conversely, a genuinely holistic approach seeks to transform cybersecurity from being perceived merely as a cost center or a purely technical support function into a strategic business enabler that contributes to organizational resilience and trustworthiness. The practical implications of successfully adopting such an integrated approach are profound, though challenging to achieve.
- −
- It necessitates enhanced and sustained cross-departmental collaboration, actively breaking down entrenched silos between IT/security teams and various business units (e.g., finance, operations, legal). Practically, this requires strong leadership commitment, clear communication channels, and often, a cultural shift towards shared responsibility for security.
- −
- It calls for the cultivation or acquisition of cybersecurity professionals who possess not only deep technical expertise but also strong business acumen, risk management understanding, and effective communication skills to engage with diverse stakeholders. Finding or developing such hybrid talent is a significant practical challenge for many organizations.
- −
- It demands the development, implementation, and consistent tracking of security metrics that resonate with business leaders and clearly demonstrate the value of security investments in terms of tangible risk reduction, operational continuity, and business enablement [35]. Defining these metrics and collecting the necessary data can be a complex practical undertaking.
- −
- It implies a strategic organizational shift towards comprehensive and integrated risk management frameworks (e.g., systematically integrating cybersecurity risk into broader Enterprise Risk Management—ERM programs) that inherently consider business context, impact tolerance, and strategic objectives in all security decision making.
- Trends and Challenges: The drive towards a more holistic perspective in security analytics aligns with and is supported by several important technological and conceptual trends, while also facing significant practical challenges and limitations in its implementation:
- −
- Supporting Trends: The development and adoption of Governance, Risk, and Compliance (GRC) platforms aim to provide an integrated view and management of these interconnected domains, thereby facilitating a more holistic approach to enterprise risk. The increasing emphasis within modern system development on “Security by Design” and “Privacy by Design” principles inherently requires a proactive, holistic understanding of business processes and data flows from the earliest stages. Furthermore, advancements in AI-driven analytics are leading to more context-aware security tools, such as UEBA, which can better understand user roles and typical business functions and flag meaningful deviations from normal operational patterns.
- −
- Persistent Real-World Challenges:
- *
- A primary limitation is bridging the persistent communication and cultural gap that often exists between highly technical security teams and more business-focused operational units. Overcoming differing priorities and vocabularies requires concerted effort.
- *
- Developing meaningful, quantifiable metrics that effectively translate technical security outcomes (e.g., vulnerabilities patched, incidents contained) into demonstrable business value (e.g., risk reduction in monetary terms and protection of revenue streams) remains a complex practical task.
- *
- The inherent complexity of accurately modeling diverse, dynamic, and often opaque business processes, along with their intricate IT dependencies and associated security risks, can be a daunting implementation hurdle.
- *
- As noted earlier, the lack of widely adopted, standardized holistic frameworks and the difficulty in empirically demonstrating the direct ROI of a holistic approach compared to purely technical interventions can significantly hinder its adoption and investment justification in practice.
- *
- Moreover, implementing a truly holistic security strategy often involves higher initial and ongoing investment in terms of time, skilled resources, and significant organizational change management, creating a substantial practical barrier, especially for resource-constrained organizations.
4.2. The Landscape of Enterprise Security Analytics Adoption Across Industries and Sectors (RQ2)
- Elaboration & Evidence: As detailed in Table 3, the adoption of security analytics is notably concentrated in large-scale enterprises, particularly within the ICT sector [41], financial services and government institutions [35,61,66,90], and industrial control systems (ICS) environments [92]. For enterprises where specific size was not a primary focus or findings were deemed broadly applicable (“Any” size), adoption remains prominent in critical utilities (power, fuel, energy) [42,84], financial services [74,91], ICT and related fields (e.g., telecommunications, software development) [45,78,87,88,89], health systems [83], and increasingly in emerging smart infrastructures (including IoT and Cyber–Physical Systems) [76,93]. A substantial number of the reviewed studies that targeted large enterprises [37,38,47,55,57,64,68,70,71,75,77,94] or were applicable to “Any” enterprise size [46,48,56,65,67,80,86,96,97] did not specify a narrow industry focus. This suggests either the perceived general applicability of the discussed analytics solutions and foundational techniques or a primary research focus on the techniques themselves rather than their sector-specific nuances.Critically, our review reveals that only a small fraction of the selected literature (three studies: [58] focusing on Smart Infrastructures/IIoT and [49,95] focusing on non-sector-specific contexts) explicitly centers on the unique security analytics needs and adoption contexts of SMEs. Study [58], for instance, explores Security as a Service (SECaaS) tailored for SMEs operating in the Industrial Internet of Things (IIoT) domain, highlighting a potential service delivery model more attuned to their resource constraints. This starkly limited representation of SMEs in the research landscape underscores a significant practical gap; despite their collective economic importance and recognized vulnerability to a wide array of cyber threats, the development and academic investigation of tailored security analytics solutions for this segment appear considerably underdeveloped.
- Analysis: The observed concentration of security analytics adoption and associated research primarily within large enterprises and critical sectors can be attributed to several interconnected practical drivers and realities:
- −
- Resource Availability and Operational Complexity: Large organizations typically possess substantially greater financial and dedicated human resources, enabling them to invest in sophisticated, often expensive, analytics platforms and the specialized personnel required to manage them. They also tend to operate more extensive and complex IT/OT environments, generating vast volumes of data that both necessitates and benefits from advanced analytical capabilities for effective oversight and threat detection.
- −
- Elevated Risk Profile and Potential Impact: These larger entities are often high-value, high-visibility targets for sophisticated cyberattacks. In practical terms, a security breach can lead to catastrophic financial losses, severe reputational damage, erosion of customer trust, and widespread operational disruption (e.g., in financial systems [35,66,90] or industrial control environments [92]). This heightened risk calculus mandates proactive and advanced security measures, including robust analytics.
- −
- Stringent Regulatory and Compliance Pressures: Critical sectors such as finance, healthcare [83], and utilities [42,84] frequently operate under stringent and evolving regulatory and compliance mandates (e.g., PCI DSS, HIPAA, NERC CIP). These obligations often compel the implementation of comprehensive security monitoring, auditing, and reporting capabilities, for which security analytics are increasingly indispensable.
- Trends and Challenges:
- −
- Supporting Trends for Broader, More Equitable Adoption: The increasing availability of cloud-based security analytics platforms and SECaaS models [58] offers a promising pathway through which to make advanced analytical capabilities more accessible and affordable to a wider range of organizations, including SMEs. These models can practically reduce the need for significant upfront infrastructure investment and specialized in-house management expertise. Concurrently, the ongoing development of AI-powered analytics aims to automate more complex detection, analysis, and response tasks, potentially lowering the skills barrier for adoption and making sophisticated tools more usable by teams with limited data science experience. Furthermore, there is a growing trend towards industry-specific threat intelligence sharing and the formation of collaborative platforms (e.g., Information Sharing and Analysis Centers—ISACs). These initiatives can significantly enrich security analytics with relevant, contextual threat data, a practical benefit that can enhance the effectiveness of analytics for all participating organizations, including SMEs within those sectors.
- −
- Persistent Real-World Challenges and Limitations: Despite positive trends, significant hurdles remain. The primary practical challenge for SMEs continues to be the often-prohibitive cost and perceived operational complexity of implementing and managing effective security analytics tools, compounded by a persistent general shortage of affordable cybersecurity talent. For organizations of all sizes, real-world difficulties include the technical complexities of integrating analytics solutions with diverse, often siloed, IT and Operational Technology (OT) systems; ensuring consistent data quality and governance across disparate sources; and effectively managing the sheer volume of alerts generated to avoid analyst fatigue and ensure critical threats are prioritized. Developing truly sector-specific analytics that deeply understand unique industrial protocols (e.g., in manufacturing or medical systems), specific regulatory requirements, and distinct business process risks is a continuous and resource-intensive effort. The “Not mentioned” category regarding industry application in many studies (see Table 3) might also point to an ongoing practical challenge in translating general academic research findings into clear, actionable, sector-specific guidance for practitioners. Finally, a key design and market limitation is ensuring that sophisticated analytics solutions can scale down effectively for smaller organizations or those with less mature security programs, without losing essential functionality or becoming overly simplistic. Addressing these multifaceted challenges is critical for democratizing effective security analytics across the entire enterprise spectrum.
4.3. Technical Aspects of the Implementation and Optimization of Security Analytics in Enterprises (RQ3)
- Machine Learning and Computational Intelligence (MLCI): This was the most prominent category of analytical techniques identified, being central to the methodologies of 12 reviewed studies [56,57,60,63,71,72,73,75,76,77,80,90].
- −
- Elaboration and Evidence: MLCI, as presented in the literature, encompasses a range of computational models, statistical analysis methods, and machine learning algorithms applied to security data for tasks such as threat detection, classification, and predictive decision making. Examples from the reviewed studies include the application of Support Vector Machines (SVMs) for intrusion detection and malware classification, aiming to distinguish malicious from benign activities [60,71]; the use of Deep-Q Networks (DQNs), which combine Q-learning with deep learning, for optimizing incident response strategies [77]; the deployment of Latent Dirichlet Allocation (LDA) and N-Gram models for text-based anomaly detection and deriving threat intelligence from unstructured log data [45,80]; and the utilization of ensemble learning methods like boosting to improve predictive accuracy for threat identification [76]. It is important to note that while these studies report varying degrees of success, their practical validity and reliability in broader enterprise contexts often depend on the specific datasets used for training/testing and the experimental conditions, necessitating careful evaluation before widespread real-world deployment.
- −
- Analysis: The observed dominance of MLCI in the reviewed literature stems from its inherent capabilities to process vast and complex security data volumes, automatically learn intricate patterns indicative of known and potentially unknown threats, detect subtle anomalies that might evade traditional rule-based systems, and make predictions about future security events. These capabilities can translate into significant practical benefits for enterprises, such as enhanced efficiency in security operations through automation, improved detection rates for novel and evasive threats, and better prioritization of alerts. However, the adoption and operationalization of MLCI in enterprise security are fraught with substantial practical challenges and limitations:
- *
- A critical dependency on large volumes of high-quality, representative training data is a major operational limitation. Enterprises often struggle with the practicalities of collecting, cleaning, labeling (especially for supervised learning), and maintaining such datasets. Biased, incomplete, or outdated training data can lead to poorly performing models, increased false positives/negatives, and even discriminatory or unfair outcomes in real-world security applications (e.g., in user behavior analytics).
- *
- The susceptibility of ML models to adversarial attacks—where malicious actors intentionally craft inputs to evade detection (evasion attacks) or manipulate training data to compromise model integrity (poisoning attacks)—is a severe real-world limitation. This means the ML systems themselves can become an attack surface, requiring dedicated defensive strategies and robust validation, which adds to their operational complexity.
- *
- The need for specialized data science and cybersecurity expertise to develop, deploy, manage, and interpret MLCI solutions creates a significant skills gap. Practically, many organizations find it costly and difficult to acquire and retain talent with this hybrid skillset, potentially leading to over-reliance on third-party solutions (which may lack transparency) or an inability to fully leverage the potential of ML technologies.
- −
- Trends and Challenges: Key technological trends aim to address some of these limitations. There is increasing adoption of deep learning for more complex, high-dimensional data, though this often intensifies the data and explainability challenges. Research into Explainable AI (XAI) is critical for building trust and making ML outputs more transparent and actionable for security practitioners. The development of automated ML (AutoML) tools seeks to lower the technical barrier for model development, potentially making ML more accessible to enterprises with limited in-house data science capabilities; however, their practical limitation lies in potentially producing less optimized or generalizable models for highly specific cybersecurity tasks compared to expert-driven approaches. Ongoing real-world challenges that significantly impact the effectiveness and reliability of MLCI in enterprises include
- *
- Managing data and concept drift: Security threats and enterprise environments constantly evolve, causing ML models trained on historical data to degrade in performance over time. Practically, this necessitates continuous monitoring, frequent retraining, and robust MLOps (machine learning operations) practices, which represent a significant and ongoing operational overhead.
- *
- Preventing model poisoning and ensuring model robustness: Protecting the integrity of training data and developing models resilient to adversarial manipulation are crucial for maintaining the reliability of ML-based security defenses.
- *
- Reducing alert fatigue from false positives: Despite the sophistication of ML, poorly tuned models or those affected by data drift can still generate a high volume of false alarms. This remains a persistent practical issue, potentially overwhelming security teams and leading to genuine threats being overlooked if not carefully managed through continuous model evaluation and threshold tuning.
- *
- Bridging the cybersecurity–data science skills gap: This remains a fundamental constraint limiting the widespread and effective adoption and innovative application of MLCI in many enterprise security programs.
- Graph-Based Approaches: These techniques were significantly featured in 9 studies [32,48,62,77,82,89,92,93,98].
- −
- Elaboration and Evidence: GBAs leverage graph theory to construct models of enterprise environments, representing entities (e.g., network assets, users, applications, vulnerabilities) as nodes and their relationships (e.g., connectivity, access rights, dependencies) as edges. This structure facilitates the analysis of complex attack pathways, systemic dependencies, and potential incident propagation routes. Examples from the reviewed literature include the development and application of attack graphs to model potential multi-step attack scenarios and identify critical choke points [82,92]; the combination of Markov chains with GBAs to enable predictive modeling of attack progression and likelihood [32]; and the design of specialized graph structures like the adversarial influence and susceptibility graphs (AISC graphs) for conducting comprehensive defense posture and vulnerability analysis [48]. While these studies demonstrate the utility of GBA for specific security analyses, it is important to recognize that the practical validity and reliability of such models in real-world enterprise settings are heavily contingent on the accuracy and completeness of the data used to construct the graph and the underlying assumptions about entity interactions. Translating the full, dynamic complexity of large-scale enterprise networks into an accurate and maintainable graph model remains a significant endeavor.
- −
- Analysis: GBAs offer a powerful visual and analytical paradigm that can significantly enhance an enterprise’s understanding of complex interdependencies and systemic risks. Practically, they are invaluable for attack path analysis, enabling security teams to visualize how attackers might traverse the network to reach critical assets, and for vulnerability management, by helping to prioritize remediation efforts based on exploitability and potential impact. This visual and relational context can lead to more informed and proactive security decision making. However, the practical application of GBA in enterprises faces notable limitations and challenges.
- *
- Complexity of Construction and Maintenance: Constructing and, more critically, maintaining accurate, large-scale security graphs is a complex and often computationally intensive task. The initial data collection, entity discovery, relationship mapping, and vulnerability attribution can require significant effort and integration with multiple data sources. In highly dynamic enterprise environments where assets, configurations, and software versions change frequently, keeping the graph model current is a continuous operational challenge. An outdated graph quickly loses its analytical value and can lead to misleading conclusions.
- *
- Scalability for Large Enterprises: As enterprise networks grow, the size and complexity of the corresponding security graphs can become immense. Scalability, in terms of graph storage, processing power required for complex queries (e.g., pathfinding, centrality analysis), and timely updates, can be a significant practical concern. For very large organizations, this may necessitate investment in specialized (and potentially expensive) graph database technologies or distributed processing frameworks.
- *
- Data Quality and Completeness Dependencies: The utility of any GBA is fundamentally dependent on the quality, accuracy, and completeness of the input data used to build the graph. Incomplete asset inventories, inaccurate vulnerability information, or missing relationship data can lead to an incomplete or misleading representation of the actual attack surface, thereby limiting the real-world reliability of the analysis.
- −
- Trends and Challenges: Current trends in GBA for security include the integration of GBA with machine learning (ML) techniques for dynamic graph analysis, aiming to automatically detect anomalies or predict changes within graph structures that might indicate emerging threats (as seen in approaches like [77]). This has the practical implication of potentially making graphs more adaptive and responsive to evolving conditions, but also introduces the inherent complexities of ML (e.g., data requirements and interpretability). Another trend is the development of graph databases specifically optimized for handling the scale and query patterns of security-related data, which could alleviate some scalability concerns. Despite these advancements, significant real-world challenges persist.
- *
- Achieving Real-Time Graph Analytics at Enterprise Scale: Many critical security use cases, such as detecting an ongoing attack as it propagates or assessing the immediate impact of a new high-severity vulnerability, require real-time or near real-time analytical capabilities. The computational cost of continuously updating and performing complex queries on massive graphs in real time remains a major technical and practical hurdle for most enterprises.
- *
- Standardizing Graph Modeling Approaches for Security: The lack of widely adopted, standardized schemas, ontologies, or modeling languages for representing security-relevant entities and relationships in graphs makes it difficult to share graph models, compare results effectively across different GBA tools or research studies, and seamlessly integrate GBA with other security information systems. Practically, this fragmentation hinders interoperability and the development of a mature ecosystem of reusable GBA components and benchmarks.
- Behavioral Analysis and Profiling: This category of analytical techniques was prominent in six of the reviewed studies [33,47,55,66,79,94].
- −
- Elaboration and Evidence: BAP focuses on understanding, modeling, and ultimately predicting the actions and patterns of behavior exhibited by users, systems, network entities, and potential attackers. The reviewed literature showcases techniques such as Multi-Dimensional Behavioral Analytics, which considers diverse aspects like login frequency, resource access patterns, and data transfer volumes to build comprehensive profiles [33]; the analysis of historical attack behaviors and attacker Tactics, Techniques, and Procedures to predict future threat vectors or campaign characteristics [79]; and the application of behavior-based intelligence, which models past legitimate behavior to identify statistically significant anomalies potentially indicative of compromise or insider activity [66]. The practical reliability of BAP techniques often hinges on the quality and granularity of the data sources used for profiling (e.g., endpoint logs, network traffic, application logs), the sophistication of the anomaly detection algorithms employed, and, critically, the stability and predictability of what constitutes “normal” behavior within the monitored environment.
- −
- Analysis: The increasing adoption of BAP in enterprises reflects a strategic shift towards detecting threats, such as insider threats and APTs, that are specifically designed to evade traditional signature-based defenses, often by mimicking legitimate user or system behavior. BAP enables more user-centric and context-aware security monitoring. This can lead to more accurate threat identification by tailoring detection to individual user roles, responsibilities, and typical activity patterns, thereby potentially reducing the high volume of false positives often associated with generic security rules. It also provides rich contextual data crucial for forensic investigations. However, the implementation of BAP is accompanied by significant practical limitations.
- *
- Establishing and Maintaining Accurate Behavioral Baselines: This is arguably the most substantial challenge. In large, diverse, and dynamic enterprise environments with evolving job roles, frequent personnel changes, and new application deployments, “normal” behavior is a constantly moving target. The initial baselining period required to learn these norms can be lengthy and resource-intensive. More importantly, maintaining the accuracy of these baselines necessitates continuous learning, adaptation, and periodic re-evaluation, which is computationally demanding and operationally complex. Failure to do so in practice leads to degraded model performance, resulting in either excessive false positive alerts or, conversely, missed detections of genuine threats.
- *
- Data Volume and Granularity Requirements: Effective BAP often requires the collection and analysis of vast quantities of granular data from multiple sources. This presents challenges related to data storage, processing power, and the potential performance impact on monitored systems or networks.
- *
- Privacy and Ethical Considerations: The detailed collection and analysis of user and system behavior data inherently raise significant privacy concerns. Enterprises must practically navigate complex legal frameworks (e.g., GDPR, CCPA, and local labor laws concerning employee monitoring) and ethical considerations. Implementing BAP necessitates the development of clear governance policies, ensuring transparency with users regarding what data is collected and for what purpose (where appropriate and legally required), employing robust data anonymization or pseudonymization techniques when feasible, and implementing stringent access controls and audit trails to prevent misuse of sensitive behavioral data. These considerations can significantly influence the scope and methodology of BAP deployment.
- −
- Trends and Challenges: BAP is a core technological component of modern UEBA platforms and is increasingly being integrated with Identity and Access Management (IAM) systems. This integration has the practical implication of enabling more dynamic, risk-based authentication and adaptive access controls (e.g., requiring step-up authentication or restricting access if a user’s behavior suddenly deviates significantly from their established profile). Despite these advancements, several persistent real-world challenges limit the universal effectiveness and ease of BAP deployment:
- *
- Minimizing False Positives and Alert Fatigue: While BAP aims for higher accuracy, poorly tuned systems, inadequate baselining, or a failure to account for legitimate behavioral variances can still generate a high number of false positive alerts. This remains a critical operational challenge, as it can overwhelm SOC analysts, leading to alert fatigue, a loss of trust in the BAP system, and ultimately, the risk of genuine threats being overlooked.
- *
- Adapting Baselines to Dynamic Organizational Contexts: As noted, effectively and efficiently adapting behavioral baselines to reflect legitimate changes in user roles, responsibilities, business processes, and IT systems is an ongoing practical and technical hurdle. This requires sophisticated adaptive algorithms and potentially significant computational resources for continuous model retraining and validation.
- *
- Ethical Implications of Continuous Monitoring and Potential for Misinterpretation: Beyond legal privacy compliance, the continuous monitoring inherent in BAP raises broader ethical questions about workplace surveillance and the potential for misinterpretation of automatically flagged “anomalies”, which could unfairly impact individuals. Enterprises must carefully balance legitimate security needs with their ethical obligations to employees, ensuring fairness, transparency, and mechanisms for redress. This often necessitates clear communication strategies and robust oversight of BAP system outputs and subsequent actions.
- Modeling Techniques: Various modeling techniques were explored in six of the reviewed studies [36,42,58,91,97,101].
- −
- Elaboration and Evidence: This category encompasses conceptual or mathematical representations of systems, threats, or security processes, designed to facilitate understanding, risk assessment, and prediction. Examples from the literature include general threat modeling methodologies, the application of the STRIDE threat model (STRIDE is a model of threats developed at Microsoft, used to identify and categorize potential threats to a system. See https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats (accessed on 29 April 2025)), leveraging the MITRE ATT&CK framework for describing adversary tactics and techniques, and model-based behavior prediction.
- −
- Analysis: MT provides structured methodologies that can aid enterprises in proactively identifying system vulnerabilities and understanding potential attack vectors. Frameworks like MITRE ATT&CK offer a valuable common lexicon, improving communication within the cybersecurity community and enabling more consistent threat intelligence sharing. The primary practical implication is a more systematic and potentially proactive approach to risk management. However, a key limitation is that all models are abstractions and may not capture the full complexity or dynamic nature of real-world enterprise environments. This necessitates continuous, resource-intensive updating to maintain their relevance and accuracy, failing which they risk providing a false sense of security or misdirecting defensive efforts.
- −
- Trends and Challenges: A strong trend is the increasing operationalization of the MITRE ATT&CK framework within security operations for detection engineering, threat hunting, and incident response. Automated tools are also more frequently used to support the threat modeling process, offering efficiency gains. The primary challenges lie in keeping these models continuously updated in parallel with the rapidly evolving threat landscape and the organization’s own IT changes. Furthermore, effectively integrating model outputs into the broader security analytics lifecycle (e.g., linking threat model findings to SIEM alert correlation or SOAR playbook triggers) remains an issue requiring careful planning and technical integration.
- Ontologies and Knowledge Graphs: These methods, employing structured knowledge frameworks, were discussed in four of the reviewed studies [61,74,99,102].
- −
- Elaboration and Evidence: OKG techniques utilize formal, structured representations of knowledge—defining entities, their properties, and the relationships between them—to enhance security analysis and reasoning. Examples include Ontology-Based Automated Penetration Testing, where ontologies guide the selection and application of testing tools [61], and the use of knowledge graphs to map security-relevant entities (e.g., assets, vulnerabilities, threat actors, TTPs) and their interconnections for advanced threat detection and incident response [74]. The effectiveness of OKG-driven security analytics is highly dependent on the quality, completeness, and consistency of the underlying ontology or knowledge graph, as well as the sophistication of the reasoning engines applied to them.
- −
- Analysis: OKGs offer the potential for richer semantic understanding of complex security data, improved automated reasoning capabilities, and enhanced automation of security tasks. They can help to integrate diverse data sources into a unified model and provide a more holistic, context-aware view of the enterprise security landscape. However, the limitations are the significant complexity and substantial effort involved in developing, meticulously maintaining, and continuously populating comprehensive security ontologies and knowledge graphs. This requires specialized expertise (e.g., ontologists, knowledge engineers, cybersecurity domain experts), considerable time investment, and robust governance processes, making the ROI difficult to justify for some organizations.
- −
- Trends and Challenges: Emerging trends involve leveraging natural language processing (NLP) and large language models (LLMs) to assist in the semi-automated construction and querying of security knowledge graphs, potentially reducing the manual effort involved. Efforts towards creating standardized security ontologies also aim to improve interoperability and reusability. Despite these trends, significant challenges with interoperability between different OKG systems and ensuring the scalability of these complex structures for large, dynamic enterprise environments persist, limiting broader adoption.
- Foundational Data Management and Representation Techniques: While not strictly analysis techniques themselves, effective DMR practices, highlighted in studies such as [41,47,64] (three studies focusing on these aspects), are crucial enablers for any advanced security analytics.
- −
- Elaboration and Evidence: This category includes critical infrastructure components such as In-Memory Data Management for accelerated data processing and enabling real-time analytics crucial for timely incident response [41,47], as well as effective data representation techniques, including advanced visualization methods, for formatting and presenting complex security data in ways that aid human interpretation and pattern identification [64]. The choice of DMR techniques involves trade-offs regarding cost, performance, scalability, and implementation complexity.
- −
- Analysis: Efficient DMR is fundamental to the overall performance, reliability, and utility of any enterprise security analytics system. Practically, slow data access, poor data quality, or ineffective visualization can severely hamper threat detection, incident investigation, and response capabilities, regardless of the sophistication of the analytical algorithms employed. The clear implication is that strategic investment in robust data infrastructure (including storage, processing, and integration capabilities) and user-centric visualization tools is as critical to successful security analytics as the analytical models themselves. A key limitation for some organizations can be the cost and complexity associated with implementing and maintaining state-of-the-art DMR infrastructure and acquiring the necessary data engineering skills.
- −
- Trends and Challenges: Current trends include the increasing adoption of big data platforms (e.g., data lakes, data lakehouses) specifically for security data to handle volume and variety, alongside advanced interactive visualization tools designed to make complex data more accessible to analysts. Persistent challenges involve managing the sheer scale of security data generated daily, ensuring consistent data quality and governance across diverse sources, and effectively presenting complex analytical outputs in an intuitive, actionable, and timely manner for often overburdened security analysts.
- Quantitative Analysis in Security Analytics:
- −
- Elaboration and Evidence: This approach centers on the use of numerical data, statistical methods [86], and computational techniques to measure [57], quantify, and objectively evaluate security-related phenomena [92]. It often involves analyzing metrics such as the frequency and impact of security incidents [32], the financial cost of breaches, or the performance of security controls [38]. For instance, studies have employed Game Theory and stochastic modeling to quantify outcomes of security strategies [31], or computational intelligence and programming languages like R to develop a numerical understanding of threats [90].
- −
- Analysis: Quantitative analysis is vital for enterprises to prioritize risks, justify security investments, allocate resources effectively, and make data-driven operational decisions. Its strengths lie in its objectivity, potential for automation, and the comparability of results. However, its effectiveness can be limited by the need for large volumes of high-quality data and an inability to fully capture nuanced, unmeasurable, or emergent aspects of security concerns, such as attacker intent or the subtleties of human behavior [90]. An over-reliance on purely quantitative metrics can sometimes lead to a narrow understanding of a complex and dynamic threat landscape.
- −
- Trends and Challenges: The trend towards Big Data analytics and AI/ML (as discussed in Observation 5) heavily fuels quantitative security analysis by enabling the processing of vast datasets for anomaly detection, predictive risk scoring, and automated response. Challenges include ensuring the quality and integrity of input data for these models, avoiding “metric fixation”, managing alert fatigue from purely quantitative systems, and developing quantitative models that are truly representative of real-world security effectiveness.
- Qualitative Analysis in Security Analytics:
- −
- Elaboration and Evidence: Qualitative analysis emphasizes subjective information, in-depth contextual understanding, and expert judgment [103]. It involves gathering and interpreting non-numerical data such as textual descriptions from incident reports, interview data with security personnel, observational studies of security operations [102], or detailed case studies. Examples include model-based qualitative analysis to understand threat intricacies [36] and the use of threat modeling frameworks like STRIDE combined with threat tree analysis to explore vulnerabilities [91].
- −
- Analysis: This approach is invaluable for uncovering hidden patterns, understanding the “why” behind security events, exploring behavioral indicators, identifying emerging threats not yet quantifiable [74], and assessing the usability and practical effectiveness of security processes. It provides richness and depth that quantitative data alone cannot. However, qualitative findings can be subject to researcher interpretation and potential biases, may be more time-consuming to collect and analyze, and are often less generalizable than quantitative results. For enterprises, qualitative insights are crucial for developing targeted training, refining incident response plans based on real-world scenarios, and understanding the socio-technical aspects of security.
- −
- Trends and Challenges: Trends include the increasing use of NLP to extract insights from unstructured qualitative data (e.g., threat intelligence reports and user feedback). Qualitative methods are also central to usability studies for security tools and understanding human factors in cybersecurity. Challenges involve the difficulty of scaling qualitative analysis, integrating its findings with quantitative data systems in a meaningful way, and ensuring rigor in qualitative data collection and interpretation.
- Mixed-Methods Analysis in Security Analytics:
- −
- Elaboration and Evidence: A mixed-methods approach strategically combines quantitative and qualitative techniques to leverage the strengths of both, aiming for a more comprehensive and nuanced understanding. The reviewed literature explicitly highlighted several studies adopting this integrated methodology (see Table 4) to gain a more holistic perspective on their research questions.
- −
- Analysis: Mixed-methods research can provide stronger validation of findings through triangulation, offer deeper insights by explaining quantitative results with qualitative data (or vice-versa), and lead to more robust and actionable conclusions. The relatively limited explicit mention of mixed-methods studies in the enterprise security analytics literature could indicate a methodological gap or an area wherein research practices could be more explicitly articulated. Encouraging more mixed-methods research could significantly enhance the depth, relevance, and practical applicability of security analytics studies. For enterprises, this translates to the ability to combine ‘what’ is happening (from quantitative data) with ‘why’ it’s happening (from qualitative insights) for more effective security strategies.
- −
- Trends and Challenges: The increasing complexity of cybersecurity problems inherently calls for multifaceted analytical approaches. The development of XAI can be seen as a move towards bridging quantitative model outputs with qualitative human-understandable explanations, embodying a mixed-methods spirit. The primary challenge is the increased complexity in research design, data collection, analysis, and interpretation, requiring researchers proficient in both paradigms.
- Elaboration and Evidence of Strategic Approaches:
- −
- Reactive Strategy: This traditional strategy involves responding to security incidents after they have occurred, with the primary goals of damage mitigation and rapid recovery. Activities include closing exploited vulnerabilities, eradicating malware, and restoring systems. While essential for incident management, this strategy’s inherent nature signifies a prior failure in prevention or detection. In our reviewed literature, the number of studies that concentrated primarily on developing or applying analytical techniques specifically for this reactive phase was comparatively low (five studies—[41,53,66,68,74]). This observation suggests that while analytics for reactive measures are explored, the main thrust of research in security analytics tends to favor earlier intervention points—such as proactive, predictive, and detective capabilities—aligning with the broader cybersecurity goal of minimizing threat impact before extensive reaction is needed.
- −
- Detective Strategy: This strategy is critically focused on the timely identification of security incidents either as they are actively unfolding or very shortly after their occurrence. The primary objective is to minimize the dwelling time of threats within the enterprise environment. It relies on a foundation of robust systems for continuous monitoring, comprehensive logging from diverse sources (such as network devices, servers, endpoints, and applications) and sophisticated alerting mechanisms. These components work in concert to flag anomalous patterns, suspicious activities, or known indicators of compromise (IoCs) that could signal an ongoing or imminent attack [45,60,63,73,78]. Key technologies often underpinning this strategy include SIEM platforms, Intrusion Detection/Prevention Systems (IDS/IPS), and EDR solutions. Security analytics plays a pivotal role here by automating the analysis of vast data volumes, correlating disparate events to uncover complex attack chains, and employing techniques ranging from signature-based detection and rule-based correlation to advanced statistical anomaly detection and machine learning models for identifying novel or evasive threats. With 27 studies in our review emphasizing this approach, its importance in providing crucial, timely awareness for immediate and effective incident response is well established, forming an indispensable layer in a defense-in-depth security structure.
- −
- Proactive Strategy: This strategy embodies a forward-looking security philosophy focused on taking preemptive measures to prevent cyber threats from materializing, thereby reducing the overall attack surface and strengthening defenses before an attack is attempted. It moves beyond merely reacting to incidents by systematically identifying and mitigating vulnerabilities and fortifying security postures. Core activities include comprehensive and continuous risk assessments, including threat modeling to anticipate potential attack vectors; regular security audits to ensure compliance and identify weaknesses; diligent system hardening (e.g., removing unnecessary services, configuring secure baselines, implementing robust access controls); timely and prioritized patch management to address known vulnerabilities; and engaging security awareness training, often incorporating phishing simulations, to mitigate human error. Furthermore, developing and testing robust incident response plans is a key proactive step, ensuring preparedness to minimize damage should an incident occur despite preventative efforts [46,48,80,86,92]. Analytics can support proactive strategies by, for instance, prioritizing vulnerability remediation based on exploit likelihood and asset criticality, or by identifying anomalous configurations that deviate from security best practices. As the most frequently emphasized strategy in the reviewed literature (40 studies), it highlights a clear strategic preference within the field for preventing incidents, an approach that is demonstrably more cost-effective and less disruptive to enterprise operations than reacting to successful breaches.
- −
- Predictive Strategy: Representing the most advanced and aspirational security posture, this strategy aims to forecast potential future threats and anticipate attack campaigns, often before they are widely known or actively launched. It leverages sophisticated analytical techniques, primarily ML and AI, to analyze vast datasets comprising observed patterns from historical incidents, real-time security telemetry, global threat intelligence feeds, dark web monitoring, and even geopolitical or sector-specific risk factors. Unlike proactive strategies that harden defenses against known vulnerability classes or general threats, predictive analytics seeks to identify the likelihood of specific future attack types, emerging malicious tools, or targeted campaigns, enabling organizations to adapt their defenses preemptively and in a highly targeted manner [37,67,75,79,84]. The goal is to neutralize threats before they can cause harm by providing early warnings and actionable intelligence. While immensely powerful in concept, this approach faces challenges such as the need for high-quality, voluminous data, the risk of false positives/negatives in predictions, ensuring the explainability of AI-driven insights, and staying ahead in an adversarial landscape where attackers also evolve their tactics. Nevertheless, the significant research attention given to predictive strategies (22 studies) underscores a strong industry-wide aspiration to achieve this forward-looking capability, striving to shift from a reactive or merely preventative stance to one of true cyber foresight.
- Analysis of the Strategic Shift: The observed strategic evolution is driven by several factors, including the increasing volume, sophistication, and business impact of cyber threats. Purely reactive approaches are no longer sustainable or cost-effective in the face of advanced persistent threats and rapid exploit development.
- −
- Value Proposition: Proactive and predictive strategies offer the potential to significantly reduce the likelihood and impact of security incidents, thereby enhancing business resilience and trust. Detective capabilities remain critical as a bridge, providing the necessary alerts when preventative measures are bypassed.
- −
- Interdependencies: Effective security relies on a balanced combination of these strategies. For instance, detective mechanisms provide data that can refine proactive controls and train predictive models. A robust proactive posture reduces the burden on detective and reactive systems.
- −
- Enterprise Impact: This strategic shift necessitates changes in organizational culture, processes, and technology adoption. It requires investment in advanced analytical tools (as mentioned in the Ob5 on techniques like MLCI), skilled personnel, and comprehensive threat intelligence. The emphasis on proactive strategies also implies a greater need for thorough risk assessments and preventative maintenance.
- −
- Challenges: While proactive and predictive strategies are aspirational, their implementation faces hurdles. Predictive analytics, for example, demands high-quality data, sophisticated modeling (which can be a “black box”), and carries the risk of false positives or negatives. Measuring the ROI of proactive measures can also be more challenging than quantifying the cost of a prevented incident.
- Trends and Challenges:
- −
- Enabling Technologies: The rise of Big Data platforms, advanced AI/ML algorithms (especially deep learning), and cloud computing power are key enablers of more effective detective, proactive, and particularly predictive strategies. SOAR platforms are enhancing detective and reactive capabilities by automating responses. Threat Intelligence Platforms (TIPs) are crucial for informing proactive defenses and predictive models.
- −
- Emerging Paradigms: Concepts like zero-trust architecture embody a proactive stance by default. The push for “security by design” also aligns with proactive thinking.
- −
- Persistent Hurdles: Challenges include managing the vast amounts of data required, addressing the cybersecurity skills gap (especially for data scientists and AI specialists in security), integrating diverse security tools and data sources, ensuring the explainability and trustworthiness of predictive models, and keeping pace with the adversarial use of AI. The cost of implementing and maintaining advanced analytics solutions also remains a significant barrier for some organizations.
4.4. Key Data Sources and Types in Enterprise Security Analytics (RQ4)
- System Monitoring and Log Data: This foundational category remains paramount in security analytics, encompassing real-time information and historical logs generated by various IT assets. Examples include application logs, firewall and proxy logs, Intrusion Detection/Prevention System (IDS/IPS) alerts, operating system event data, endpoint activity logs, and server log files (e.g., [37,41,59,64,83,84]). Analyzing these logs provides a granular audit trail crucial for detecting anomalous behaviors, reconstructing attack timelines, conducting forensic investigations, and demonstrating compliance. The sheer volume, velocity, and variety of this data, however, present significant challenges in terms of collection, storage, normalization, and processing, necessitating robust data management and analytics platforms.
- Network Configuration and Traffic Data: Data derived from network elements, including traffic logs (e.g., NetFlow, sFlow, PCAPs) and device configuration information, are central to understanding network-based threats (e.g., [49,59,65,75,102]). These sources offer a granular view of the network’s architecture, communication patterns, and operational status. Analyzing this data helps to reveal potential vulnerabilities in network design, detect unauthorized access attempts, identify malware propagation, and monitor for unusual data exfiltration. Changes in configuration or anomalous network traffic patterns (like unexpected spikes or communication with known malicious IPs) can serve as early indicators of a security breach. The integrated analysis of network configuration and traffic data significantly enhances an enterprise’s capability to anticipate, identify, and react to network-borne threats, though the increasing use of encryption can sometimes limit deep packet inspection capabilities.
- User and Application Behavior Data: Understanding user and application activities is increasingly critical, with data collected from identity and access management systems, application interaction logs, mobile application usage, and even physical access systems (e.g., [33,54,55,71,73]). This data provides significant insights into behavior patterns, allowing security analytics, particularly UEBA solutions, to establish baselines of normal activity and identify deviations that could indicate compromised credentials, insider threats, or malicious application behavior. While powerful, the collection and analysis of such data must carefully navigate privacy considerations and the complexity of accurately distinguishing malicious from benign behavioral anomalies.
- Business and Transactional Data: Integrating data from core business processes and systems, such as query logs, financial transaction records, and customer relationship management (CRM) data, provides crucial context to security events (e.g., [34,67,74,91]). This category allows security analytics to correlate technical indicators of compromise with potential business impact, aiding in the prioritization of alerts and response efforts. For instance, anomalous access to sensitive customer databases or unusual transaction patterns can be flagged as high-priority security events. The challenge often lies in effectively integrating disparate business systems with security analytics platforms and defining clear correlations between business processes and security telemetry.
- External Threat Intelligence and Public Datasets: Leveraging external information sources is vital for enriching internal security data and enhancing proactive and predictive capabilities. This includes curated threat intelligence feeds (providing indicators of compromise, information on threat actors, and attack methodologies), publicly available breach datasets, vulnerability databases, and security scan reports from reputable sources (e.g., [52,60,72,77]). These external inputs are invaluable for benchmarking internal security posture, training machine learning models to recognize emerging threats, and providing early warnings about new attack techniques or campaigns. The effective use of such data depends on its timeliness, reliability, and the ability to operationalize it within the enterprise’s security analytics framework.
- Compliance and Policy Data: Information related to regulatory compliance mandates, internal security policies, security rules, and configuration standards plays an essential role in governance-focused security analytics (e.g., [38,85,86]). Compliance reports help to identify deviations from required security baselines, informing corrective actions and shaping strategic security investments. Security rules and policy definitions provide a benchmark against which system configurations and user behaviors can be evaluated, enabling the detection of policy violations that could introduce vulnerabilities or elevate risk. Analyzing this data helps enterprises maintain an informed, adaptive, and demonstrable approach to meeting their security and regulatory obligations.
4.5. Barriers to Implementing Security Analytics in Enterprises (RQ5)
- Data-Related Challenges: The foundation of security analytics is data, yet its collection, management, utility, and protection present substantial hurdles. Enterprises grapple with the sheer volume, variety, and velocity of security data, particularly log data emanating from diverse event sources [63,68]. This is exacerbated by the lack of standardized data formats and retrieval protocols, especially in specialized environments like SCADA systems [84], complicating data integration and interoperability. Furthermore, the inherent security risks of big data systems themselves, often not designed with security as a primary concern, can introduce new vulnerabilities [46]. A critical and increasingly prominent data-related challenge is ensuring data privacy. Practically, enterprises must navigate complex and stringent data protection regulations (e.g., GDPR, CCPA, HIPAA), which impose significant obligations regarding the collection, processing, storage, and retention of personal or sensitive data used in security analytics. This includes implementing robust data minimization strategies, anonymization or pseudonymization techniques where feasible, managing user consent appropriately, and ensuring the privacy of data processed by third-party analytics tools or cloud services [59]. The limitation here is that overly aggressive data anonymization can sometimes reduce the utility of data for certain types of security analysis, creating a difficult trade-off. Consequently, the collected data is frequently noisy, containing redundancies, lacking crucial context, or posing privacy risks if not handled correctly, all of which can hamper efficient and compliant analysis, particularly for concurrent event tracking and user behavior analytics [64]. Addressing these multifaceted data issues requires robust data governance frameworks (incorporating privacy-by-design), advanced data-processing techniques, and the development of centralized data correlation platforms capable of providing a unified, reliable, and compliant view of security events [67].
- Technological and Methodological Limitations: Beyond data, the tools and underlying methodologies for security analytics face limitations. Current security assessment techniques often involve a cumbersome mix of automated scanning and manual exploitation, demanding significant expertise and up-to-date information on system topologies and vulnerabilities to interpret complex outputs like attack graphs [77,97]. Many traditional security tools struggle to effectively address modern, sophisticated threats [72] or to analyze the security of increasingly prevalent machine learning systems themselves [48]. A critical and persistent challenge is the difficulty in adapting to dynamic network security threats and accurately identifying unknown or novel attacks in real-time [65]. These technological gaps are compounded by methodological shortcomings, such as the lack of clear definitions or standardized approaches for applying emerging techniques like process mining in cybersecurity [78]. A significant methodological limitation impacting the entire field is the dearth of standardized evaluation metrics and benchmarks for security analytics solutions. Practically, this makes it exceedingly difficult for enterprises to objectively compare the effectiveness, efficiency, and ROI of different tools and approaches, to benchmark their own capabilities against industry peers, or for researchers to reliably compare outcomes across studies. This lack of standardization hinders mature adoption and slows evidence-based advancements. Moreover, the relatively slow maturation of theoretical foundations for core cybersecurity concepts (e.g., logical vulnerability, comprehensive threat modeling, quantifiable risk assessment) and the absence of a common, expressive language for security policies impede the development of more robust, adaptable, interoperable, and scientifically grounded analytics solutions [74].
- Resource and Organizational Constraints: Effective security analytics is not solely a technological problem; it is significantly constrained by available resources and various organizational factors, including ethical considerations. Financial constraints are a major barrier, particularly for SMEs that often lack the capital to invest in advanced security analytics tools, technologies, and specialized personnel [58,86,92]. These costs can be further inflated by the absence of a comprehensive, overarching security strategy, leading to fragmented investments and reduced cost-effectiveness [52]. A critical human factor is the pervasive shortage of skilled cybersecurity professionals capable of managing analytics systems, interpreting complex data, and translating insights into actionable security measures [52,86,92]. This includes a common lack of dedicated data scientist roles within security teams who could unlock deeper insights from business security data [67]. Compounding this is often a general lack of cybersecurity awareness and understanding among general employees [66,92], who can be unwitting sources of risk. It is also crucial to engage users appropriately, avoiding overwhelming them with security tasks to prevent security fatigue, which can undermine compliance and vigilance [49,105]. Furthermore, ethical considerations in the deployment of security analytics, particularly those involving extensive data monitoring (e.g., user behavior analytics) or AI-driven decision making, present significant organizational challenges. Practically, organizations must establish clear ethical guidelines, governance structures, and oversight mechanisms to prevent algorithmic bias, ensure fairness, maintain employee trust, and address the societal implications of surveillance technologies [94]. The limitation is that navigating these ethical dimensions requires careful deliberation and may constrain the types of data collected or the manner in which analytics are applied, demanding a balance between security objectives and ethical responsibilities.
- Systemic Complexity and the Evolving Threat Landscape: The inherent complexity of modern IT environments and the continuously evolving nature of cyber threats present formidable challenges. The intricate and heterogeneous nature of enterprise systems, including sprawling cloud infrastructures, creates significant integration and interoperability problems for security analytics solutions [52,68]. Enterprises often struggle with effectively translating high-level cybersecurity objectives into concrete design choices and accurately assessing risks within these complex architectures [101]. Existing security approaches may not be well-suited for analyzing the emergent behaviors and vulnerabilities in such multifaceted systems [48]. Specific complexities also arise in managing security in public cloud environments due to shared responsibility models and, as noted earlier, heightened concerns over data privacy, security, and operational efficiency [59]. Simultaneously, organizations face an increasingly dynamic and sophisticated threat landscape, ranging from financially motivated malware campaigns to highly targeted attacks by organized crime and nation-state actors [38]. Traditional signature-based security mechanisms are often inadequate for detecting these advanced threats in real time [56], and the detection of unknown or zero-day threats remains a persistent and critical difficulty across the field [65,66].
4.6. Research Gaps and Future Opportunities in Enterprise Security Analytics (RQ6)
- Innovations in Methodological Approaches: There is a persistent call for the exploration and refinement of advanced analytical techniques, particularly deep learning and ensemble learning methods, to achieve higher accuracy and robustness in threat detection and prevention [47,67,72]. Future research should move beyond simply applying these models to investigating their explainability (XAI) in a security context, their resilience against adversarial AI attacks, and their optimal application to specific threat types. Critical foundational gaps also exist in data-preprocessing stages, including more intelligent and automated feature selection, effective data-labeling strategies (especially for unsupervised or semi-supervised learning in dynamic environments), and efficient data-encoding techniques capable of handling vast, real-time data streams without prohibitive computational overhead [75]. A significant opportunity lies in designing adaptive, context-aware, and human-centric security analytics solutions. Current approaches often inadequately account for the dynamic nature of enterprise systems, the evolving behavior of attackers, and critical human factors in security operations [92]. Future work should aim to develop systems that can learn from and adapt to these changing conditions, potentially incorporating behavioral economics or cognitive science principles to better support human analysts and mitigate security fatigue [66]. Furthermore, the field would benefit from increased methodological rigor and standardization. This includes establishing clearer definitions and frameworks for applying techniques like process mining to cybersecurity incident response and analysis [78], and developing a common, expressive language for security policies to facilitate interoperability and automated reasoning [74].
- Holistic Data Integration and Cross-Functional Contextualization: A recurring challenge, and thus a research opportunity, is the effective integration and semantic correlation of heterogeneous data sources. Beyond merely aggregating logs, future research needs to focus on developing sophisticated frameworks for fusing diverse internal data (e.g., system, network, application logs) with external sources (e.g., threat intelligence, vulnerability databases) to construct a unified, comprehensive, and real-time understanding of an enterprise’s security position [74,90]. This includes research into scalable data fusion techniques and knowledge representation for complex security events. Crucially, there is a significant gap in integrating security analytics outputs with broader business functions, such as enterprise risk management, compliance reporting, and internal audit processes [67]. Future studies should explore methodologies and platforms that can translate technical security findings into quantifiable business risk metrics, enabling better strategic decision making and demonstrating the value of security investments. This involves bridging the communication gap between technical security teams and executive leadership.
- Enhanced Human–Computer Interaction and Actionable Insights: While the power of analytics grows, ensuring that human analysts can effectively interpret and act upon the generated insights remains a challenge. Future research is needed in advanced data visualization techniques tailored for complex, high-dimensional security data, moving beyond static dashboards to interactive exploration tools that can help analysts identify subtle patterns, anomalies, and causal relationships quickly [38,47]. Closely related is the need for explainable AI in security analytics. As models become more complex, their “black-box” nature can hinder trust and adoption. Research into XAI methods that can articulate the reasoning behind alerts or predictions in a human-understandable manner is vital for empowering analysts and enabling more confident response actions.
- Achieving True Real-Time, Proactive, and Predictive Capabilities: The demand for real-time detection and response continues to outpace the capabilities of many existing systems. Periodic log collection and batch processing are often insufficient for countering advanced, fast-moving attacks [56]. Future research should focus on developing ultra-low latency stream processing architectures, edge analytics for immediate threat detection in distributed environments (e.g., IoT/OT), and robust frameworks for automated or semi-automated incident response based on real-time analytical triggers [76]. Beyond real-time detection, there is a significant opportunity to enhance predictive security analytics. This involves improving the accuracy, lead time, and actionability of threat prediction models, exploring novel indicators of future attacks (e.g., precursor activities, geopolitical shifts) and developing methodologies to translate these predictions into concrete, prioritized proactive defense measures.
- Ensuring Scalability, Performance, and Operational Efficiency: As data volumes continue to explode, the scalability and performance of security analytics frameworks remain paramount concerns, especially in large-scale enterprise and big data environments [37]. Continuous research is required into more efficient distributed processing algorithms, optimized data storage and retrieval mechanisms, hardware acceleration techniques, and automated resource management for analytics pipelines to ensure that solutions can cope with increasing demands without prohibitive costs or performance degradation [59,75]. This also includes research into automated security assessment tools that can scale across large, dynamic infrastructures.
- Democratizing Security Analytics for SMEs: A notable and critical research gap is the limited focus on the unique security analytics needs of SMEs [106]. SMEs often face similar threat landscapes as larger enterprises but typically operate with significant resource constraints (in terms of finances, technical expertise, and dedicated personnel). Future research should prioritize the development and adaptation of scalable, cost-effective, and user-friendly security analytics solutions specifically tailored to SME environments. This includes exploring lightweight deployment models, managed security analytics service offerings suitable for SMEs, and practical guidance on implementing foundational analytics capabilities within their operational context. Addressing this gap is essential for fostering a more inclusive and resilient digital economy.
5. Limitations of the Review and Observations on the Primary Literature
5.1. Limitations of This Systematic Literature Review Process
5.2. Reflections on the Reviewed Primary Literature
- Potential for Publication Bias in the Field: While our own review process is susceptible to publication bias, it is also important to consider that this bias may be present in the broader field of enterprise security analytics. The body of reviewed literature appeared to predominantly feature studies reporting successful implementations or positive outcomes of proposed techniques. Research studies that find a particular data analysis method or security strategy to be ineffective (producing null or negative results), or where the results are not clear-cut (producing inconclusive findings), are likely not published as often as studies that show positive or successful results.
- Extent of Real-World Validation and Methodological Rigor: A notable observation from our review of the included studies is the variation in the extent of real-world validation for the proposed methodologies and technologies. While some studies presented evaluations in operational or near-operational settings, many appeared to rely on simulations, lab-based experiments, or proof-of-concept demonstrations. The direct applicability and scalability of findings from studies lacking robust validation in diverse, real-world enterprise environments can be limited. Furthermore, while our quality appraisal focused on relevance and clarity for this review’s mapping objectives, a formal critical appraisal of the intrinsic methodological soundness of each primary study (e.g., using tools like CASP or AMSTAR) was not utilized as an exclusion criterion, which means the included studies themselves may have varied in their methodological rigor.
- Standardization of Evaluation Metrics and Benchmarks: Our review of the primary literature indicated a potential challenge related to the lack of standardized evaluation metrics and benchmarks within the enterprise security analytics field. Different studies often employed varied, and sometimes bespoke, metrics to evaluate the performance of their proposed techniques or systems. This heterogeneity makes direct comparison of results across studies difficult and can hinder efforts to establish widely accepted benchmarks for efficacy and efficiency in enterprise security analytics. This lack of standardization was also noted as a broader challenge in the field (Observation 9).
- Depth of Discussion of Practical Long-Term Considerations: While many studies proposed novel techniques or frameworks, the depth of discussion of long-term practical considerations for enterprise adoption—such as maintainability, the total cost of ownership beyond initial deployment, the evolution of models in response to concept drift, or integration with existing complex legacy systems—was not consistently extensive across all reviewed papers.
6. Conclusions
Supplementary Materials
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Appendix A
Study | Authors | Title | RQ1 | RQ2 | RQ3 | RQ4 | RQ5 | RQ6 |
---|---|---|---|---|---|---|---|---|
S1 [41] | Cheng, F., Azodi, A., Jaeger, D., & Meinel, C. | Multi-Core Supported High Performance Security Analytics | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S2 [42] | Holm, H., Sommestad, T., Ekstedt, M., & Nordström, L. | CySeMoL: A Tool for Cyber Security Analysis of Enterprises | ✓ | ✓ | ✓ | ✓ | ✓ | |
S3 [43] | Purboyo, T. W. | Methods for Strengthening a Computer Network Security | ✓ | ✓ | ✓ | |||
S4 [31] | Wang, Y., Li, J., Meng, K., Lin, C., & Cheng, X. | Modeling and Security Analysis of Enterprise Network Using Attack-Defense Stochastic Game Petri Nets | ✓ | ✓ | ✓ | ✓ | ✓ | |
S5 [32] | Abraham, S., & Nair, S. | Cyber Security Analytics: A Stochastic Model for Security Quantification Using Absorbing Markov Chains | ✓ | ✓ | ✓ | |||
S6 [34] | Ahmed, N., & Matulevičius, R. | Presentation and Validation of Method for Security Requirements Elicitation from Business Processes | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S7 [33] | Brewer, R. | Advanced Persistent Threats: Minimising the Damage | ✓ | ✓ | ✓ | ✓ | ✓ | |
S8 [35] | Li, T., & Horkoff, J. | Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach | ✓ | ✓ | ✓ | ✓ | ✓ | |
S9 [36] | Rieke, R., Repp, J., Zhdanova, M., & Eichler, J. | Monitoring Security Compliance of Critical Processes | ✓ | ✓ | ✓ | ✓ | ✓ | |
S10 [91] | Xin, T., & Xiaofang, B. | Online Banking Security Analysis Based on STRIDE Threat Model | ✓ | ✓ | ✓ | |||
S11 [98] | Abraham, S., & Nair, S. | Exploitability Analysis Using Predictive Cybersecurity Framework | ✓ | ✓ | ||||
S12 [87] | Cai, Z. Q., Zhao, J. B., Li, Y., Si, S. B., & Ni, M. N. | Information Security Evaluation of System Based on Bayesian Network | ✓ | ✓ | ||||
S13 [53] | Hussein, M. K., Zainal, N. B., & Jaber, A. N. | Data Security Analysis for DDoS Defense of Cloud-Based Networks | ✓ | ✓ | ✓ | |||
S14 [83] | Rieke, R., Zhdanova, M., & Repp, J. | Security Compliance Tracking of Processes in Networked Cooperating Systems | ✓ | ✓ | ✓ | ✓ | ✓ | |
S15 [61] | Stepanova, T., Pechenkin, A., & Lavrova, D. | Ontology-Based Big-Data Approach to Automated Penetration Testing of Large-Scale Heterogeneous Systems | ✓ | ✓ | ✓ | ✓ | ✓ | |
S16 [82] | Välja, M., Korman, M., Shahzad, K., & Johnson, P. | Integrated Metamodel for Security Analysis | ✓ | ✓ | ✓ | |||
S17 [85] | Alsaleh, M. N., Husari, G., & Al-Shaer, E. | Optimizing the ROI of Cyber Risk Mitigation | ✓ | ✓ | ✓ | ✓ | ||
S18 [71] | Baluda, M., Pistoia, M., Castro, P., & Tripp, O. | A Framework for Automatic Anomaly Detection in Mobile Applications | ✓ | ✓ | ✓ | ✓ | ✓ | |
S19 [88] | Jenab, K., Khoury, S., & LaFevor, K. | Flow-Graph and Markovian Methods for Cyber Security Analysis | ✓ | ✓ | ✓ | ✓ | ||
S20 [99] | Kim, B. J., & Lee, S. W. | Analytical Study of Cognitive Layered Approach for Understanding Security Requirements Using Problem Domain Ontology | ✓ | ✓ | ✓ | ✓ | ||
S21 [62] | Kotenko, I., & Doynikova, E. | Dynamical Calculation of Security Metrics for Countermeasure Selection in Computer Networks | ✓ | ✓ | ✓ | ✓ | ||
S22 [90] | Naik, N., Jenkins, P., Savage, N., & Katos, V. | Big-Data Security Analysis Approach Using Computational Intelligence Techniques in R for Desktop Users | ✓ | ✓ | ✓ | ✓ | ✓ | |
S23 [54] | Niu, D. D., Liu, L., Zhang, X., Lü, S., & Li, Z. | Security Analysis Model, System Architecture and Relational Model of Enterprise Cloud Services | ✓ | ✓ | ✓ | ✓ | ✓ | |
S24 [100] | Ou, X. | A Bottom-Up Approach to Applying Graphical Models in Security Analysis | ✓ | ✓ | ✓ | ✓ | ||
S25 [89] | Välja, M., Lagerström, R., Korman, M., & Franke, U. | Bridging the Gap Between Business and Technology in Strategic Decision-Making for Cyber Security Management | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S26 [94] | Buyukkayhan, A. S., Oprea, A., Li, Z., & Robertson, W. | Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis | ✓ | ✓ | ✓ | |||
S27 [96] | Kato, Y., Kanai, A., Tanimoto, S., & Hatashima, T. | Dynamic Security Level Analysis Method Using Attack Tree | ✓ | ✓ | ✓ | |||
S28 [70] | Lagerström, R., Johnson, P., & Ekstedt, M. | Automatic Design of Secure Enterprise Architecture | ✓ | ✓ | ✓ | |||
S29 [95] | Nguyen, H. H., Palani, K., & Nicol, D. M. | An Approach to Incorporating Uncertainty in Network Security Analysis | ✓ | ✓ | ✓ | ✓ | ||
S30 [47] | Sapegin, A., Jaeger, D., Cheng, F., & Meinel, C. | Towards a System for Complex Analysis of Security Events in Large-Scale Networks | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S31 [55] | Zhu, G., Zeng, Y., & Guo, M. | A Security Analysis Method for Supercomputing Users’ Behaviour | ✓ | ✓ | ✓ | ✓ | ✓ | |
S32 [45] | Cinque, M., Cotroneo, D., & Pecchia, A. | Challenges and Directions in Security Information and Event Management (SIEM) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S33 [104] | Sion, L., Yskout, K., Van Landuyt, D., & Joosen, W. | Poster: Knowledge-Enriched Security and Privacy Threat Modeling | ✓ | ✓ | ✓ | ✓ | ||
S34 [56] | Win, T. Y., Tianfield, H., & Mair, Q. | Big-Data-Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S35 [102] | Wu, S., Zhang, Y., & Chen, X. | Security Assessment of Dynamic Networks via Integrating Semantic Reasoning and Attack Graphs | ✓ | ✓ | ✓ | ✓ | ||
S36 [63] | Lai, J. | Analysis and Visualization of Website Log Data from the Perspective of Big Data | ✓ | ✓ | ✓ | ✓ | ✓ | |
S37 [73] | Padmanaban, R., Thirumaran, M., Sanjana, V., & Moshika, A. | Security Analytics for Heterogeneous Web | ✓ | ✓ | ✓ | ✓ | ||
S38 [60] | Sharma, S., Sharma, A., & Saini, H. | Advanced Network Security Analysis (ANSA) in Big-Data Technology | ✓ | ✓ | ✓ | ✓ | ✓ | |
S39 [72] | Ahmed, A., Hameed, S., Rafi, M., & Mirza, Q. K. A. | An Intelligent and Time-Efficient DDoS Identification Framework for Real-time Enterprise Networks: SAD-F: Spark based Anomaly Detection Framework | ✓ | ✓ | ✓ | ✓ | ✓ | |
S40 [52] | Alavizadeh, H., Alavizadeh, H., & Jang-Jaccard, J. | Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud | ✓ | ✓ | ✓ | ✓ | ✓ | |
S41 [77] | Chowdhary, A., Huang, D., Mahendran, J. S., Romo, D., Deng, Y., & Sabur, A. | Autonomous Security Analysis and Penetration Testing | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S42 [57] | Elsayed, M. A., & Zulkernine, M. | PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction | ✓ | ✓ | ✓ | ✓ | ✓ | |
S43 [93] | Ivanov, D., Kalinin, M., Krundyshev, V., & Orel, E. | Automatic Security Management of Smart Infrastructures Using Attack Graph and Risk Analysis | ✓ | ✓ | ||||
S44 [84] | Nashivochnikov, N. V., Bolshakov, A. A., Lukashin, A. A., & Popov, M. | The System for Operational Monitoring and Analytics of Industry Cyber-physical Systems Security in Fuel and Energy Domains Based on Anomaly Detection and Prediction Methods | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S45 [78] | Sundararaj, A., Knittl, S., & Grossklags, J. | Challenges in IT Security Processes and Solution Approaches with Process Mining | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S46 [64] | Taylor, T., Araujo, F., & Shu, X. | Towards an Open Format for Scalable System Telemetry | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S47 [65] | Wu, L., & Deng, T. | Computer Network Security Analysis Modeling Based on Spatio-Temporal Characteristics and Deep-Learning Algorithm | ✓ | ✓ | ✓ | ✓ | ✓ | |
S48 [92] | Zhang, Y., Wang, B., Wu, C., Wei, X., Wang, Z., & Yin, G. | Attack-Graph-Based Quantitative Assessment for Industrial Control System Security | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S49 [79] | Aquino, M. F. M., & Noroña, M. I. | Enhancing Cyber Security in the Philippine Academe: A Risk-Based IT Project Assessment Approach | ✓ | ✓ | ✓ | |||
S50 [58] | Empl, P., & Pernul, G. | A Flexible Security Analytics Service for the Industrial IoT | ✓ | ✓ | ✓ | ✓ | ||
S51 [86] | Kumar, R., Singh, S., & Kela, R. | A Quantitative Security Risk Analysis Framework For Modelling and Analyzing Advanced Persistent Threats | ✓ | ✓ | ✓ | ✓ | ✓ | |
S52 [46] | Rosado, D. G., Moreno, J., Sánchez, L. E., Santos-Olmo, A., Serrano, M. A., & Fernández-Medina, E. | MARISMA-BiDa Pattern: Integrated Risk Analysis for Big Data | ✓ | ✓ | ✓ | |||
S53 [74] | Vassilev, V., Sowinski-Mydlarz, V., Gasiorowski, P., Ouazzane, K., & Phipps, A. | Intelligence Graphs for Threat Intelligence and Security Policy Validation of Cyber Systems | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S54 [80] | Chen, G., & Mazin, T. | Computer Network Security Analysis Based on Deep-Learning Algorithm | ✓ | ✓ | ||||
S55 [66] | Chun, Y. H., & Cho, M. K. | An Empirical Study of Intelligent Security Analysis Methods Utilizing Big Data | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S56 [75] | Ndichu, S., Ban, T., Takahashi, T., & Inoue, D. | Critical-Threat-Alert Detection Using Online Machine Learning | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
S57 [97] | Hankin, C., & Malacaria, P. | Attack Dynamics: An Automatic Attack-Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases | ✓ | ✓ | ✓ | |||
S58 [48] | Zou, Q., Zhang, L., Singhal, A., Sun, X., & Liu, P. | Attacks on ML Systems: From Security Analysis to Attack Mitigation | ✓ | ✓ | ✓ | |||
S59 [76] | Efiong, J. E., Akinyemi, B. O., Olajubu, E. A., Aderounmu, G. A., & Degila, J. | CyberSCADA Network Security Analysis Model for Intrusion Detection Systems in the Smart Grid | ✓ | ✓ | ✓ | ✓ | ||
S60 [59] | Vassilev, V., Ouazzane, K., Sowinski-Mydlarz, V., Maosa, H., Nakarmi, S., Hristev, M., & Radu, S. | Network Security Analytics on the Cloud: Public vs. Private Case | ✓ | ✓ | ✓ | ✓ | ✓ | |
A1 [67] | Early, G., & Stott III, W. | Preemptive Security Through Information Analytics | ✓ | ✓ | ✓ | ✓ | ✓ | |
A2 [37] | Puri, C., & Dukatz, C. | Analyzing and Predicting Security-Event Anomalies: Lessons from a Large-Enterprise Big-Data Streaming-Analytics Deployment | ✓ | ✓ | ✓ | ✓ | ✓ | |
A3 [38] | Li, Z., & Oprea, A. | Operational Security Log Analytics for Enterprise Breach Detection | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
A4 [49] | Ulmer, A., Schufrin, M., Lücke-Tieke, H., Kannanayikkal, C. D., & Kohlhammer, J. | Towards Visual Cyber-Security Analytics for the Masses | ✓ | ✓ | ✓ | ✓ | ✓ | |
A5 [68] | Chernova, E. V., Polezhaev, P. N., Shukhman, A. E., Ushakov, Y. A., Bolodurina, I. P., & Bakhareva, N. F. | Security-Event Data Collection and Analysis in Large Corporate Networks | ✓ | ✓ | ✓ | ✓ | ✓ |
References
- Kaur, J.; Ramkumar, K. The recent trends in cyber security: A review. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 5766–5781. [Google Scholar] [CrossRef]
- Shajan, A.; Rangaswamy, S. Survey of security threats and countermeasures in cloud computing. United Int. J. Res. Technol. 2021, 2, 201–207. [Google Scholar]
- Zhao, T.; Zhang, G.; Zhang, L. An Overview of Mobile Devices Security Issues and Countermeasures. In Proceedings of the 2014 International Conference on Wireless Communication and Sensor Network, Wuhan, China, 13–14 December 2014; pp. 439–443. [Google Scholar] [CrossRef]
- Lu, Y.; Xu, L.D. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics. IEEE Internet Things J. 2019, 6, 2103–2115. [Google Scholar] [CrossRef]
- Xiong, W.; Legrand, E.; Åberg, O.; Lagerström, R. Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix. Softw. Syst. Model. 2021, 21, 157–177. [Google Scholar] [CrossRef]
- Saleem, J.; Adebisi, B.; Ande, R.; Hammoudeh, M. A state of the art survey—Impact of cyber attacks on SME’s. In Proceedings of the International Conference on Future Networks and Distributed Systems, ICFNDS ’17, Cambridge, UK, 19–20 July 2017. [Google Scholar] [CrossRef]
- Corallo, A.; Lazoi, M.; Lezzi, M. Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Comput. Ind. 2020, 114, 103165. [Google Scholar] [CrossRef]
- Klein, D. Relying on firewalls? Here’s why you’ll be hacked. Netw. Secur. 2021, 2021, 9–12. [Google Scholar] [CrossRef]
- Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J. Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity 2019, 2, 20. [Google Scholar] [CrossRef]
- Tounsi, W.; Rais, H. A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput. Secur. 2018, 72, 212–233. [Google Scholar] [CrossRef]
- Narang, S. The reality of zero-day vulnerabilities. Comput. Fraud Secur. 2021, 2021, 20. [Google Scholar] [CrossRef]
- Salahdine, F.; Kaabouch, N. Social Engineering Attacks: A Survey. Future Internet 2019, 11, 89. [Google Scholar] [CrossRef]
- Rajasekar, V.; Premalatha, J.; Dhanaraj, R.K. Security analytics. In System Assurances; Elsevier: Amsterdam, The Netherlands, 2022; pp. 333–354. [Google Scholar] [CrossRef]
- Nallaperumal, K. CyberSecurity Analytics to Combat Cyber Crimes. In Proceedings of the 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, India, 13–15 December 2018; pp. 1–4. [Google Scholar] [CrossRef]
- Khan, S.; Olivia, T.S.L.; Khan, N.; Why, N.K.; Wei, T.S. Data Analytic for Cyber Security: A Review of Current Framework Solutions, Challenges and Trends. Eurasia Proc. Sci. Technol. Eng. Math. 2022, 18, 1–6. [Google Scholar] [CrossRef]
- Verma, R. Security Analytics: Adapting Data Science for Security Challenges. In Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, CODASPY ’18, Tempe, AZ, USA, 19–21 March 2018; pp. 40–41. [Google Scholar] [CrossRef]
- Sharma, G.; Tyagi, B. Security Analytics: Challenges and Future Directions. IITM J. Manag. IT 2017, 8, 37–41. [Google Scholar]
- Jing, X.; Yan, Z.; Pedrycz, W. Security Data Collection and Data Analytics in the Internet: A Survey. IEEE Commun. Surv. Tutor. 2019, 21, 586–618. [Google Scholar] [CrossRef]
- Rassam, M.A.; Maarof, M.; Zainal, A. Big Data Analytics Adoption for Cybersecurity: A Review of Current Solutions, Requirements, Challenges and Trends. J. Inf. Assur. Secur. 2017, 11, 124–145. [Google Scholar]
- Perumal, P.R.; Roy, G.G.R.; Kumar, B.R. Security Analysis of Future Enterprise Business Intelligence. In Proceedings of the 2014 World Congress on Computing and Communication Technologies, Tiruchirappalli, India, 27 February–1 March 2014; pp. 191–194. [Google Scholar] [CrossRef]
- Birzniece, I. Security Analytics: Dispelling the Fog. In Proceedings of the BIR 2018 Short Papers, Workshops and Doctoral Consortium Co-Located with 17th International Conference Perspectives in Business Informatics Research (BIR 2018), Stockholm, Sweden, 24–26 September 2018; Volume 2218, pp. 160–169. [Google Scholar]
- Grahn, K.; Westerlund, M.; Pulkkis, G. Analytics for Network Security: A Survey and Taxonomy. In Information Fusion for Cyber-Security Analytics; Springer International Publishing: Cham, Switzerland, 2016; pp. 175–193. [Google Scholar] [CrossRef]
- Mahmood, T.; Afzal, U. Security Analytics: Big Data Analytics for cybersecurity: A review of trends, techniques and tools. In Proceedings of the 2013 2nd National Conference on Information Assurance (NCIA), Rawalpindi, Pakistan, 11–12 December 2013; pp. 129–134. [Google Scholar] [CrossRef]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. Int. J. Surg. 2021, 88, 105906. [Google Scholar] [CrossRef]
- Rohan, R.; Pal, D.; Hautamäki, J.; Funilkul, S.; Chutimaskul, W.; Thapliyal, H. A systematic literature review of cybersecurity scales assessing information security awareness. Heliyon 2023, 9, e14234. [Google Scholar] [CrossRef]
- Cremer, F.; Sheehan, B.; Fortmann, M.; Kia, A.N.; Mullins, M.; Murphy, F.; Materne, S. Cyber risk and cybersecurity: A systematic review of data availability. Geneva Pap. Risk Insur.-Issues Pract. 2022, 47, 698–736. [Google Scholar] [CrossRef] [PubMed]
- Marican, M.N.Y.; Razak, S.A.; Selamat, A.; Othman, S.H. Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review. IEEE Access 2023, 11, 5442–5452. [Google Scholar] [CrossRef]
- Ratchford, M.; El-Gayar, O.; Noteboom, C.; Wang, Y. BYOD security issues: A systematic literature review. Inf. Secur. J. Glob. Perspect. 2021, 31, 253–273. [Google Scholar] [CrossRef]
- Garg, M.; Goel, A. A systematic literature review on online assessment security: Current challenges and integrity strategies. Comput. Secur. 2022, 113, 102544. [Google Scholar] [CrossRef]
- Webster, J.; Watson, R.T. Analyzing the past to prepare for the future: Writing a literature review. MIS Q. 2002, 26, xiii–xxiii. [Google Scholar]
- Wang, Y.; Li, J.; Meng, K.; Lin, C.; Cheng, X. Modeling and security analysis of enterprise network using attack–defense stochastic game Petri nets. Secur. Commun. Netw. 2012, 6, 89–99. [Google Scholar] [CrossRef]
- Abraham, S.; Nair, S. Cyber Security Analytics: A Stochastic Model for Security Quantification Using Absorbing Markov Chains. J. Commun. 2014, 9, 899–907. [Google Scholar] [CrossRef]
- Brewer, R. Advanced persistent threats: Minimising the damage. Netw. Secur. 2014, 2014, 5–9. [Google Scholar] [CrossRef]
- Ahmed, N.; Matulevičius, R. Presentation and Validation of Method for Security Requirements Elicitation from Business Processes. In Information Systems Engineering in Complex Environments; Springer International Publishing: Cham, Switzerland, 2015; pp. 20–35. [Google Scholar] [CrossRef]
- Li, T.; Horkoff, J. Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach. In Advanced Information Systems Engineering; Springer International Publishing: Cham, Switzerland, 2014; pp. 285–300. [Google Scholar] [CrossRef]
- Rieke, R.; Repp, J.; Zhdanova, M.; Eichler, J. Monitoring Security Compliance of Critical Processes. In Proceedings of the 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, Torino, Italy, 12–14 February 2014; pp. 552–560. [Google Scholar] [CrossRef]
- Puri, C.; Dukatz, C. Analyzing and Predicting Security Event Anomalies: Lessons Learned from a Large Enterprise Big Data Streaming Analytics Deployment. In Proceedings of the 2015 26th International Workshop on Database and Expert Systems Applications (DEXA), Valencia, Spain, 1–4 September 2015; pp. 152–158. [Google Scholar] [CrossRef]
- Li, Z.; Oprea, A. Operational Security Log Analytics for Enterprise Breach Detection. In Proceedings of the 2016 IEEE Cybersecurity Development (SecDev), Boston, MA, USA, 3–4 November 2016; pp. 15–22. [Google Scholar] [CrossRef]
- González-Granadillo, G.; González-Zarzosa, S.; Diaz, R. Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures. Sensors 2021, 21, 4759. [Google Scholar] [CrossRef]
- Bahrami, P.N.; Dehghantanha, A.; Dargahi, T.; Parizi, R.M.; Choo, K.K.R.; Javadi, H.H. Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures. J. Inf. Process. Syst. 2019, 15, 865–889. [Google Scholar] [CrossRef]
- Cheng, F.; Azodi, A.; Jaeger, D.; Meinel, C. Multi-core Supported High Performance Security Analytics. In Proceedings of the 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China, 21–22 December 2013; pp. 621–626. [Google Scholar] [CrossRef]
- Holm, H.; Ekstedt, M.; Sommestad, T.; NordstrM, L. CySeMoL: A tool for cyber security analysis of enterprises. In Proceedings of the 22nd International Conference and Exhibition on Electricity Distribution (CIRED 2013), Stockholm, Sweden, 10–13 June 2013; p. 1109. [Google Scholar] [CrossRef]
- Purboyo, T.W.; Kuspriyanto. Methods for strengthening a Computer network security. In Proceedings of the 2013 Joint International Conference on Rural Information & Communication Technology and Electric-Vehicle Technology (rICT & ICeV-T), Bandung-Bali, Indonesia, 26–28 November 2013; pp. 1–4. [Google Scholar] [CrossRef]
- Reddy Pulyala, S.; Gupta Desetty, A.; Dutt Jangampet, V. The Impact of Security Orchestration, Automation, and Response (SOAR) on Security Operations Center (SOC) Efficiency: A Comprehensive Analysis. Turk. J. Comput. Math. Educ. (TURCOMAT) 2019, 10, 1545–1549. [Google Scholar] [CrossRef]
- Cinque, M.; Cotroneo, D.; Pecchia, A. Challenges and Directions in Security Information and Event Management (SIEM). In Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Memphis, TN, USA, 15–18 October 2018; pp. 95–99. [Google Scholar] [CrossRef]
- Rosado, D.G.; Moreno, J.; Sánchez, L.E.; Santos-Olmo, A.; Serrano, M.A.; Fernández-Medina, E. MARISMA-BiDa pattern: Integrated risk analysis for big data. Comput. Secur. 2021, 102, 102155. [Google Scholar] [CrossRef]
- Sapegin, A.; Jaeger, D.; Cheng, F.; Meinel, C. Towards a system for complex analysis of security events in large-scale networks. Comput. Secur. 2017, 67, 16–34. [Google Scholar] [CrossRef]
- Zou, Q.; Zhang, L.; Singhal, A.; Sun, X.; Liu, P. Attacks on ML Systems: From Security Analysis to Attack Mitigation. In Information Systems Security; Springer Nature: Cham, Switzerland, 2022; pp. 119–138. [Google Scholar] [CrossRef]
- Ulmer, A.; Schufrin, M.; Lücke-Tieke, H.; Kannanayikkal, C.D.; Kohlhammer, J. Towards Visual Cyber Security Analytics for the Masses. In Proceedings of the EuroVis Workshop on Visual Analytics 2018, Brno, Czech Republic, 4 June 2018. [Google Scholar] [CrossRef]
- Geluvaraj, B.; Satwik, P.M.; Ashok Kumar, T.A. The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cyberspace. In International Conference on Computer Networks and Communication Technologies; Springer: Singapore, 2018; pp. 739–747. [Google Scholar] [CrossRef]
- Alani, M.M. Big data in cybersecurity: A survey of applications and future trends. J. Reliab. Intell. Environ. 2021, 7, 85–114. [Google Scholar] [CrossRef]
- Alavizadeh, H.; Alavizadeh, H.; Jang-Jaccard, J. Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021; pp. 1276–1284. [Google Scholar] [CrossRef]
- Hussein, M.K.; Bin Zainal, N.; Jaber, A.N. Data security analysis for DDoS defense of cloud-based networks. In Proceedings of the 2015 IEEE Student Conference on Research and Development (SCOReD), Kuala Lumpur, Malaysia, 13–14 December 2015; pp. 305–310. [Google Scholar] [CrossRef]
- Niu, D.D.; Liu, L.; Zhang, X.; Lü, S.; Li, Z. Security analysis model, system architecture and relational model of enterprise cloud services. Int. J. Autom. Comput. 2016, 13, 574–584. [Google Scholar] [CrossRef]
- Zhu, G.; Zeng, Y.; Guo, M. A Security Analysis Method for Supercomputing Users’ Behavior. In Proceedings of the 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), New York, NY, USA, 26–28 June 2017; pp. 287–293. [Google Scholar] [CrossRef]
- Win, T.Y.; Tianfield, H.; Mair, Q. Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing. IEEE Trans. Big Data 2018, 4, 11–25. [Google Scholar] [CrossRef]
- Elsayed, M.A.; Zulkernine, M. PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction. IEEE Access 2020, 8, 45184–45197. [Google Scholar] [CrossRef]
- Empl, P.; Pernul, G. A Flexible Security Analytics Service for the Industrial IoT. In Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, CODASPY ’21, Virtual, 28 April 2021; pp. 23–32. [Google Scholar] [CrossRef]
- Vassilev, V.; Ouazzane, K.; Sowinski-Mydlarz, V.; Maosa, H.; Nakarmi, S.; Hristev, M.; Radu, S. Network Security Analytics on the Cloud: Public vs. Private Case. In Proceedings of the 2023 13th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 19–20 January 2023; pp. 151–156. [Google Scholar] [CrossRef]
- Sharma, S.; Sharma, A.; Saini, H. Advanced Network Security Analysis (ANSA) in Big Data Technology. Int. J. Innov. Technol. Explor. Eng. 2019, 8, 2634–2639. [Google Scholar] [CrossRef]
- Stepanova, T.; Pechenkin, A.; Lavrova, D. Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems. In Proceedings of the 8th International Conference on Security of Information and Networks, SIN ’15, Sochi, Russia, 8–10 September 2015; pp. 142–149. [Google Scholar] [CrossRef]
- Kotenko, I.; Doynikova, E. Dynamical Calculation of Security Metrics for Countermeasure Selection in Computer Networks. In Proceedings of the 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), Heraklion, Greece, 17–19 February 2016; pp. 558–565. [Google Scholar] [CrossRef]
- Lai, J. Analysis and Visualization of Website Log Data from the Perspective of Big Data. In Proceedings of the 2019 International Conference on Computer Network, Electronic and Automation (ICCNEA), Xi’an, China, 27–29 September 2019; pp. 26–30. [Google Scholar] [CrossRef]
- Taylor, T.; Araujo, F.; Shu, X. Towards an Open Format for Scalable System Telemetry. In Proceedings of the 2020 IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA, 10–13 December 2020; pp. 1031–1040. [Google Scholar] [CrossRef]
- Wu, L.; Deng, T. Computer Network Security Analysis Modeling Based on Spatio-temporal Characteristics and Deep Learning Algorithm. J. Phys. Conf. Ser. 2020, 1648, 042111. [Google Scholar] [CrossRef]
- An empirical study of intelligent security analysis methods utilizing big data. J. Logist. Inform. Serv. Sci. 2022, 9, 26–35. [CrossRef]
- Early, G.; Stott, W., III. Preemptive Security Through Information Analytics. Inf. Secur. J. Glob. Perspect. 2015, 24, 48–56. [Google Scholar] [CrossRef]
- Chernova, E.; Polezhaev, P.; Shukhman, A.; Ushakov, Y.; Bolodurina, I.; Bakhareva, N. Security event data collection and analysis in large corporate networks. In Proceedings of the V International Conference Information Technology and Nanotechnology 2019, ITNT-2019, Samara, Russia, 21–24 May 2019; pp. 233–241. [Google Scholar] [CrossRef]
- Moshika, A.; Thirumaran, M.; Natarajan, B.; Andal, K.; Sambasivam, G.; Manoharan, R. Vulnerability Assessment in Heterogeneous Web Environment Using Probabilistic Arithmetic Automata. IEEE Access 2021, 9, 74659–74673. [Google Scholar] [CrossRef]
- Lagerstrom, R.; Johnson, P.; Ekstedt, M. Automatic Design of Secure Enterprise Architecture: Work in Progress Paper. In Proceedings of the 2017 IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW), Quebec, QC, Canada, 10–13 October 2017; pp. 65–70. [Google Scholar] [CrossRef]
- Baluda, M.; Pistoia, M.; Castro, P.; Tripp, O. A framework for automatic anomaly detection in mobile applications. In Proceedings of the International Conference on Mobile Software Engineering and Systems, ICSE ’16, Austin, TX, USA, 16–17 May 2016; pp. 297–298. [Google Scholar] [CrossRef]
- Ahmed, A.; Hameed, S.; Rafi, M.; Mirza, Q.K.A. An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks: SAD-F: Spark Based Anomaly Detection Framework. IEEE Access 2020, 8, 219483–219502. [Google Scholar] [CrossRef]
- Padmanaban, R.; Thirumaran, M.; Sanjana, V.; Moshika, A. Security Analytics for Heterogeneous Web. In Proceedings of the 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 29–30 March 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Vassilev, V.; Sowinski-Mydlarz, V.; Gasiorowski, P.; Ouazzane, K.; Phipps, A. Intelligence Graphs for Threat Intelligence and Security Policy Validation of Cyber Systems. In Proceedings of International Conference on Artificial Intelligence and Applications, Proceedings of the ICAIA 2020, Hong Kong, China, 21–23 October 2020; Springer: Singapore, 2020; pp. 125–139. [Google Scholar] [CrossRef]
- Ndichu, S.; Ban, T.; Takahashi, T.; Inoue, D. Critical-Threat-Alert Detection using Online Machine Learning. In Proceedings of the 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 17–20 December 2022; pp. 3007–3014. [Google Scholar] [CrossRef]
- Efiong, J.E.; Akinyemi, B.O.; Olajubu, E.A.; Aderounmu, G.A.; Degila, J. CyberSCADA Network Security Analysis Model for Intrusion Detection Systems in the Smart Grid. In Advances in Intelligent Systems, Computer Science and Digital Economics IV; Springer Nature: Cham, Switzerland, 2023; pp. 481–499. [Google Scholar] [CrossRef]
- Chowdhary, A.; Huang, D.; Mahendran, J.S.; Romo, D.; Deng, Y.; Sabur, A. Autonomous Security Analysis and Penetration Testing. In Proceedings of the 2020 16th International Conference on Mobility, Sensing and Networking (MSN), Tokyo, Japan, 17–19 December 2020; pp. 508–515. [Google Scholar] [CrossRef]
- Sundararaj, A.; Knittl, S.; Grossklags, J. Challenges in IT Security Processes and Solution Approaches with Process Mining. In Security and Trust Management; Springer International Publishing: Cham, Switzerland, 2020; pp. 123–138. [Google Scholar] [CrossRef]
- Aquino, M.F.M.; Noroña, M.I. Enhancing cyber security in the Philippine academe: A risk-based it project assessment approach. In Proceedings of the 11th Annual International Conference on Industrial Engineering and Operations Management, Singapore, 7–11 March 2021; pp. 5166–5179. [Google Scholar]
- Chen, G.; Mazin, T. Computer Network Security Analysis Based on Deep Learning Algorithm. In Application of Intelligent Systems in Multi-Modal Information Analytics; Springer International Publishing: Cham, Switzerland, 2022; pp. 993–998. [Google Scholar] [CrossRef]
- Ilieva, R.; Stoilova, G. Challenges of AI-Driven Cybersecurity. In Proceedings of the 2024 XXXIII International Scientific Conference Electronics (ET), Sozopol, Bulgaria, 17–19 September 2024; pp. 1–4. [Google Scholar] [CrossRef]
- Valja, M.; Korman, M.; Shahzad, K.; Johnson, P. Integrated Metamodel for Security Analysis. In Proceedings of the 2015 48th Hawaii International Conference on System Sciences, Kauai, HI, USA, 5–8 January 2015; pp. 5192–5200. [Google Scholar] [CrossRef]
- Rieke, R.; Zhdanova, M.; Repp, J. Security Compliance Tracking of Processes in Networked Cooperating Systems. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2015, 6, 21–40. [Google Scholar]
- Nashivochnikov, N.V.; Bolshakov, A.A.; Lukashin, A.A.; Popov, M. The System for Operational Monitoring and Analytics of Industry Cyber-Physical Systems Security in Fuel and Energy Domains Based on Anomaly Detection and Prediction Methods. In Cyber-Physical Systems: Industry 4.0 Challenges; Springer International Publishing: Cham, Switzerland, 2019; pp. 261–273. [Google Scholar] [CrossRef]
- Alsaleh, M.N.; Husari, G.; Al-Shaer, E. Optimizing the RoI of cyber risk mitigation. In Proceedings of the 2016 12th International Conference on Network and Service Management (CNSM), Montreal, QC, Canada, 31 October–4 November 2016; pp. 223–227. [Google Scholar] [CrossRef]
- Kumar, R.; Singh, S.; Kela, R. A Quantitative Security Risk Analysis Framework for Modelling and Analyzing Advanced Persistent Threats. In Foundations and Practice of Security; Springer International Publishing: Cham, Switzerland, 2021; pp. 29–46. [Google Scholar] [CrossRef]
- Cai, Z.Q.; Zhao, J.B.; Li, Y.; Si, S.B.; Ni, M.N. Information security evaluation of system based on Bayesian network. In Proceedings of the 2015 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Singapore, 6–9 December 2015; pp. 315–319. [Google Scholar] [CrossRef]
- Jenab, K.; Khoury, S.; LaFevor, K. Flow-Graph and Markovian Methods for Cyber Security Analysis. Int. J. Enterp. Inf. Syst. 2016, 12, 59–84. [Google Scholar] [CrossRef]
- Valja, M.; Lagerstrom, R.; Korman, M.; Franke, U. Bridging the gap between business and technology in strategic decision-making for cyber security management. In Proceedings of the 2016 Portland International Conference on Management of Engineering and Technology (PICMET), Honolulu, HI, USA, 4–8 September 2016; pp. 32–42. [Google Scholar] [CrossRef]
- Naik, N.; Jenkins, P.; Savage, N.; Katos, V. Big data security analysis approach using Computational Intelligence techniques in R for desktop users. In Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece, 6–9 December 2016; pp. 1–8. [Google Scholar] [CrossRef]
- Xin, T.; Ban, X. Online Banking Security Analysis based on STRIDE Threat Model. Int. J. Secur. Its Appl. 2014, 8, 271–282. [Google Scholar] [CrossRef]
- Zhang, Y.; Wang, B.; Wu, C.; Wei, X.; Wang, Z.; Yin, G. Attack Graph-Based Quantitative Assessment for Industrial Control System Security. In Proceedings of the 2020 Chinese Automation Congress (CAC), Shanghai, China, 6–8 November 2020. [Google Scholar] [CrossRef]
- Ivanov, D.; Kalinin, M.; Krundyshev, V.; Orel, E. Automatic security management of smart infrastructures using attack graph and risk analysis. In Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, 27–28 July 2020; pp. 295–300. [Google Scholar] [CrossRef]
- Buyukkayhan, A.S.; Oprea, A.; Li, Z.; Robertson, W. Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis. In Research in Attacks, Intrusions, and Defenses; Springer International Publishing: Cham, Switzerland, 2017; pp. 73–97. [Google Scholar] [CrossRef]
- Nguyen, H.H.; Palani, K.; Nicol, D.M. An Approach to Incorporating Uncertainty in Network Security Analysis. In Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS ’17, Hanover, MD, USA, 4–5 April 2017; pp. 74–84. [Google Scholar] [CrossRef]
- Kato, Y.; Kanai, A.; Tanimoto, S.; Hatashima, T. Dynamic security level analysis method using attack tree. In Proceedings of the 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), Nagoya, Japan, 24–27 October 2017; pp. 1–3. [Google Scholar] [CrossRef]
- Sonmez, F.O.; Hankin, C.; Malacaria, P. Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases. Comput. Secur. 2022, 123, 102938. [Google Scholar] [CrossRef]
- Abraham, S.; Nair, S. Exploitability analysis using predictive cybersecurity framework. In Proceedings of the 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF), Gdynia, Poland, 24–26 June 2015; pp. 317–323. [Google Scholar] [CrossRef]
- Kim, B.J.; Lee, S.W. Analytical Study of Cognitive Layered Approach for Understanding Security Requirements Using Problem Domain Ontology. In Proceedings of the 2016 23rd Asia-Pacific Software Engineering Conference (APSEC), Hamilton, New Zealand, 6–9 December 2016; pp. 97–104. [Google Scholar] [CrossRef]
- Ou, X. A Bottom-Up Approach to Applying Graphical Models in Security Analysis. In Graphical Models for Security; Springer International Publishing: Cham, Switzerland, 2016; pp. 1–24. [Google Scholar] [CrossRef]
- Sion, L.; Yskout, K.; Van Landuyt, D.; Joosen, W. Knowledge-enriched security and privacy threat modeling. In Proceedings of the 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion), Gothenburg, Sweden, 27 May–3 June 2018. [Google Scholar]
- Wu, S.; Zhang, Y.; Chen, X. Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs. In Proceedings of the 2018 IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China, 7–10 December 2018; pp. 1166–1174. [Google Scholar] [CrossRef]
- Evrin, V.; CISA; CRISC; COBIT 2019 Foundation; CDPSE; CEHv9; ISO 27001-22301-20000 LA. Risk assessment and analysis methods: Qualitative and quantitative. ISACA J. 2021, 2, 1–6. [Google Scholar]
- Sekharan, S.S.; Kandasamy, K. Profiling SIEM tools and correlation engines for security analytics. In Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 22–24 March 2017; pp. 717–721. [Google Scholar] [CrossRef]
- Cram, W.A.; Proudfoot, J.G.; D’Arcy, J. When enough is enough: Investigating the antecedents and consequences of information security fatigue. Inf. Syst. J. 2020, 31, 521–549. [Google Scholar] [CrossRef]
- Alahmari, A.; Duncan, B. Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence. In Proceedings of the 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, 15–19 June 2020; pp. 1–5. [Google Scholar] [CrossRef]
Database | ID | Total |
---|---|---|
ACM Digital Library | DB01 | 31 |
IEEE Xplore | DB02 | 401 |
Proquest | DB03 | 119 |
ScienceDirect | DB04 | 55 |
Scopus | DB05 | 622 |
Web of Science | DB06 | 263 |
Total | 1491 |
Technology | Impact on Cybersecurity Analytics |
---|---|
Cloud Computing | Provides scalable and flexible infrastructure for hosting data-intensive analytics; enables efficient network monitoring, real-time threat detection, and supports business continuity. |
Big Data | Enables the ingestion, storage, and processing of vast and diverse security data volumes; facilitates the extraction of actionable insights for comprehensive threat detection and mitigation. |
Web Technologies | Serve as a critical data source (e.g., weblogs, application data) and a platform for delivering interactive security dashboards, visualizations, and real-time alerts for timely incident response. |
Machine Learning (AI Subset) | Empowers automated detection of complex patterns, anomalies, and suspicious behaviors from large datasets; facilitates predictive analytics for early threat identification and proactive defense. |
Deep Learning (AI Subset) | Handles highly complex, unstructured, and high-dimensional data; enables automatic feature engineering and continuous model adaptation for more accurate and proactive threat intelligence. |
Targeted Industry/Sector/Domain/Field | Size of Enterprise | Studies |
---|---|---|
ICT and Related Fields | Large-scale | [41] |
Any | [45,78,87,88,89] | |
Financial Services (including Online Banking) and Government Institutions | Large-scale | [35,61,66,90] |
Any | [74,91] | |
Industrial Control and Security Systems | Large-scale | [92] |
Utilities (Power, Fuel, Energy) | Any | [42,84] |
Health Systems | Any | [83] |
Smart Infrastructures and Systems (including IoT, IIoT, Cyber--Physical Systems, Smart Grid) | Any | [76,93] |
SME | [58] | |
Not mentioned | Large-scale | [37,38,47,55,57,64,68,70,71,75,77,94] |
SME | [49,95] | |
Any | [46,48,56,65,67,80,86,96,97] |
Study | Framework, Platform, Prototype | Analysis Techniques | Method | Model | Tool | Name | Type of Analysis | Strategy |
---|---|---|---|---|---|---|---|---|
S1 [41] Cheng_2013 | ✓ | In-memory data management | – | – | – | SAL | Mix | Proactive & Reactive |
S2 [42] Holm_2013 | – | Modelling language | – | – | ✓ | CySeMoL | Quantitative | Proactive |
S3 [43] Purboyo_2013 | – | Visualisation | ✓ | ✓ | – | – | Mix | Proactive |
S4 [31] Wang_2013 | – | Game theory & Stochastic | ✓ | ✓ | – | ADSGN | Quantitative | Proactive |
S5 [32] Abraham_2014 | – | Absorbing Markov chains & Attack graph | – | ✓ | – | – | Quantitative | Predictive |
S6 [34] Ahmed_2014 | – | Role-based access control (RBAC) | ✓ | – | – | SREBP | – | Proactive |
S7 [33] Brewer_2014 | – | Multi-dimensional behavioural analytics | ✓ | – | – | – | Mix | Proactive & Predictive |
S8 [35] Li_2014 | ✓ | Three-layer conceptual model | ✓ | – | – | – | – | Proactive |
S9 [36] Rieke_2014 | – | Model-based | – | ✓ | – | – | Qualitative | Predictive |
S10 [91] Xin_2014 | – | STRIDE threat model & Threat tree analysis | ✓ | ✓ | – | – | Qualitative | Proactive |
S11 [98] Abraham_2015 | ✓ | Attack graph & Stochastic modelling | – | ✓ | – | Non-homogeneous Markov Model | Quantitative | Predictive |
S12 [87] Cai_2015 | ✓ | Analytic Hierarchy Process (AHP) | – | ✓ | – | IBN | Mix | Proactive |
S13 [53] Hussein_2015 | ✓ | Virtualised honeypot & Covariance matrix | ✓ | – | – | – | Quantitative | Proactive & Reactive |
S14 [83] Rieke_2014 | – | Compliance monitoring & Model-based behavior prediction | – | ✓ | – | PSA@R | Qualitative | Predictive |
S15 [61] Stepanova_2015 | ✓ | Ontology-based automated penetration testing | ✓ | – | ✓ | – | Mix | Proactive |
S16 [82] Valja_2015 | – | Attack graph-based | – | ✓ | – | Extension of P2CySeMoL | Quantitative | Proactive |
S17 [85] Alsaleh_2016 | ✓ | Extensible Configuration Checklist Description Format (XCCDF) & vulnerability scoring systems | – | ✓ | – | – | Quantitative | Proactive |
S18 [71] Baluda_2016 | ✓ | Grubbs’ test, Support Vector Machine & Automata-based behavioral modeling | – | – | ✓ | EMMA | Quantitative | Detective |
S19 [88] Jenab_2016 | – | Flow-graph concept & Markovian method | – | ✓ | – | – | Quantitative | Detective & Predictive |
S20 [99] Kim_2016 | ✓ | Problem domain ontology | ✓ | – | – | – | – | Proactive |
S21 [62] Kotenko_2016 | – | Attack graph & Security metric calculation | – | – | – | – | Quantitative | – |
S22 [90] Naik_2016 | – | Computational Intelligence, Windows batch programming & R language | ✓ | – | – | – | Quantitative | Predictive |
S23 [54] Niu_2016 | ✓ | Collecting common security problems & Building a knowledge base | – | ✓ | – | – | Qualitative | Proactive |
S24 [100] Ou_2016 | ✓ | Graph generation algorithms & Customized reasoning algorithms | – | ✓ | – | – | Quantitative | Predictive |
S25 [89] Valja_2016 | – | Graph-based attack & Enterprise architecture language | ✓ | – | – | CySeMoL-ArchiMate | Quantitative | Proactive |
S26 [94] Buyukkayhan_2017 | – | Endpoint monitoring and clustering & Outlier detection | ✓ | – | – | – | Quantitative | Detective & Proactive |
S27 [96] Kato_2017 | – | Attack tree | ✓ | – | – | – | Quantitative | Proactive |
S28 [70] Lagerstrom_2017 | – | Threat modeling, domain-specific language (DSL) & Reinforcement learning | ✓ | – | ✓ | – | – | Proactive |
S29 [95] Nguyen_2017 | Uncertain graphs | ✓ | – | – | – | Quantitative | Proactive | |
S30 [47] Sapegin_2017 | ✓ | In-memory data storage, misuse detection, query-based analytics, and anomaly detection | – | – | – | REAMS | Quantitative | – |
S31 [55] Zhu_2017 | ✓ | Behaviour path restoration | ✓ | – | – | – | Mix | Detective & Proactive |
S32 [45] Cinque_2018 | – | Topic-modeling technique, Latent Dirichlet Allocation (LDA) | ✓ | – | – | – | Mix | Detective |
S33 [101] Sion_2018 | ✓ | Threat modeling, risk analysis, & Design decisions | ✓ | – | – | TMaRA | Mix | Proactive & Predictive |
S34 [56] Win_2018 | ✓ | Graph-based event correlation & Logistic regression | ✓ | – | – | BDSA | Quantitative | Proactive & Detective |
S35 [102] Wu_2018 | – | OpenVAS, Ontology- & Graph-based approach | ✓ | – | – | – | Qualitative | Proactive & Detective |
S36 [63] Lai_2019 | – | Self-organizing Maps, Fuzzy c-means & t-SNE algorithms | ✓ | ✓ | – | – | Quantitative | Detective |
S37 [73] Padmanaban_2019 | – | Probabilistic arithmetic automata & SVM | – | ✓ | – | – | Quantitative | Detective |
S38 [60] Sharma_2019 | ✓ | Hive queries, k-algorithm & SVM | – | – | – | ANSA | Quantitative | Detective |
S39 [72] Ahmed_2020 | ✓ | Apache spark framework & Customized machine learning | – | – | – | SAD-F | Quantitative | Proactive & Detective |
S40 [52] Alavizadeh_2020 | ✓ | Virtual Machine Live Migration (VM-LM) | – | – | – | – | Quantitative | Proactive |
S41 [77] Chowdhary_2020 | ✓ | Deep-Q Network and domain-specific transition matrix & Attack graph | – | – | – | ASAP | Mix | Proactive |
S42 [57] Elsayed_2020 | ✓ | Monitoring systems with graph analytics & Graph convolutional neural network (GCN) | – | – | – | PredictDeep | Quantitative | Detective & Predictive |
S43 [93] Ivanov_2020 | – | Attack graphs & Calculation of security indicators | ✓ | – | – | – | Quantitative | Proactive & Detective |
S44 [84] Nashivochnikov_2020 | ✓ | Data analysis | – | – | – | – | Quantitative | Proactive, Detective & Predictive |
S45 [78] Sundararaj_2020 | – | Process mining & Natural language processing | ✓ | – | – | – | Mix | Detective |
S46 [64] Taylor_2020 | – | Data representation | – | – | ✓ | SysFlow | Mix | Detective |
S47 [65] Wu_2020 | – | Spatio-temporal characteristics | – | ✓ | – | – | Quantitative | Detective & Predictive |
S48 [92] Zhang_2020 | – | Attack graph-based & Graph database | ✓ | – | – | – | Quantitative | Proactive |
S49 [79] Aquino_2021 | ✓ | Processing historical behavior of attacks | ✓ | – | – | – | Mix | Predictive |
S50 [58] Empl_2021 | ✓ | Threat modeling and complex event processing | – | – | – | – | – | Detective, Proactive & Predictive |
S51 [86] Kumar_2021 | ✓ | Stochastic timed automata and statistical model-checking | – | ✓ | – | ECKC | Quantitative | Proactive |
S52 [46] Rosado_2021 | – | MARISMA methodology & eMARISMA tool | ✓ | – | ✓ | MARISMA-BiDa | Mix | Proactive |
S53 [74] Vassilev_2021 | ✓ | Ontology & Knowledge graphs | – | – | – | – | Qualitative | All |
S54 [80] Chen_2022 | – | Word2Vec, N-Gram model | ✓ | ✓ | – | – | Mix | Proactive |
S55 [66] Chun_2022 | – | Behaviour-based intelligence | ✓ | – | – | – | Quantitative | Detective, Reactive & Predictive |
S56 [75] Ndichu_2022 | ✓ | Online supervised learning | – | – | – | – | Quantitative | Detective & Predictive |
S57 [97] Sonmez_2022 | ✓ | MITRE ATT&CK framework, CAPEC, CWE | – | – | ✓ | Attack Dynamics | Quantitative | Detective & Proactive |
S58 [48] Zou_2022 | – | AISC graph, two-layer MLSD graph | ✓ | – | ML-SSA | – | Quantitative | Proactive |
S59 [76] Efiong_2023 | – | Machine learning | – | ✓ | – | – | Quantitative | Detective & Predictive |
S60 [59] Vassilev_2023 | ✓ | Threat intelligence | – | – | – | – | Mix | Detective |
A1 [67] Early_2015 | – | Data analytics | ✓ | – | – | – | Quantitative | Proactive & Predictive |
A2 [37] Puri_2015 | – | Graph analytics & Data mining | ✓ | – | – | – | Quantitative | Detective & Predictive |
A3 [38] Li_2016 | ✓ | Behaviour profiling & Statistical analysis | – | – | – | – | Quantitative | Proactive & Predictive |
A4 [49] Ulmer_2018 | ✓ | Visualization and clustering & User-centered design | – | – | ✓ | – | Mix | Detective & Predictive |
A5 [68] Chernova_2019 | ✓ | Correlation analysis | – | – | – | – | Quantitative | Detective, Reactive & Proactive |
Study | Evaluation Method | Potential Security Risks | |||
---|---|---|---|---|---|
Experiment/Simulation | Case Study | Real-World Scenario | Comparison with Others | ||
S1 [41] | ✓ | – | |||
S2 [42] | ✓ | – | |||
S3 [43] | Multi-step network intrusions | ||||
S4 [31] | ✓ | Illegal intrusions | |||
S5 [32] | ✓ | ✓ | – | ||
S6 [34] | ✓ | ✓ | ✓ | – | |
S7 [33] | APTs | ||||
S8 [35] | ✓ | – | |||
S9 [36] | ✓ | Insider attacks; unauthorized access; data leakage | |||
S10 [91] | ✓ | STRIDE: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Priviledge | |||
S11 [98] | ✓ | ✓ | Gaining root access | ||
S12 [87] | ✓ | – | |||
S13 [53] | ✓ | Distributed Denial-of-Service | |||
S14 [83] | ✓ | Administrator password theft; insider attack | |||
S15 [61] | Multistage attacks & APTs | ||||
S16 [82] | ✓ | Unauthorized activity | |||
S18 [71] | ✓ | Jail-breaking; malicious carrier ID; unusual location | |||
S19 [88] | ✓ | Internal, external, and accidental threats | |||
S20 [99] | ✓ | ✓ | Illegal intrusions | ||
S21 [62] | ✓ | ✓ | SQL injection; XSS; DoS attacks | ||
S22 [90] | ✓ | ✓ | Port scanning; network scanning; brute-force attacks | ||
S24 [100] | ✓ | ✓ | ✓ | – | |
S26 [94] | ✓ | ✓ | Malware | ||
S29 [95] | ✓ | ✓ | Stuxnet worm & phishing campaign | ||
S30 [47] | ✓ | ✓ | Brute force; replay attacks; authentication failures; shared access abuse | ||
S31 [55] | ✓ | Users’ abnormal behaviours | |||
S33 [104] | ✓ | – | |||
S34 [56] | ✓ | ✓ | Malware; DDoS | ||
S35 [102] | ✓ | Multistage & Multihost attack scenarios | |||
S36 [63] | ✓ | Abnormal access | |||
S37 [73] | ✓ | ✓ | XSS; SQLi; CSRF; DDoS | ||
S38 [60] | ✓ | ✓ | Service-denial and scan/flood attacks (NULL, SYN, X-MAS) | ||
S39 [72] | ✓ | DDoS | |||
S40 [52] | ✓ | ✓ | Malicious co-resident VMs | ||
S41 [77] | ✓ | ✓ | Known APTs & CVEs | ||
S42 [57] | ✓ | Anomalies | |||
S43 [93] | ✓ | ✓ | CVE vulnerabilities | ||
S44 [84] | ✓ | – | |||
S45 [78] | ✓ | ✓ | – | ||
S46 [64] | ✓ | ✓ | Sensitive-file interactions; process execustions; suspicious traffic | ||
S47 [65] | ✓ | – | |||
S48 [92] | ✓ | Multi-step attacks; known CVEs | |||
S49 [79] | ✓ | Various | |||
S50 [58] | Spoofing; tampering; DoS; privilege elevation | ||||
S51 [86] | ✓ | APTs | |||
S52 [46] | ✓ | Various | |||
S53 [74] | ✓ | Spyware; baiting; DDoS; vishing; smishing; hijacking; spam; scareware; rogue ATM infection | |||
S56 [75] | ✓ | ✓ | ✓ | Various | |
S57 [97] | ✓ | Known CVEs | |||
S58 [48] | ✓ | Evasion; poisoning; exploratory & Software attacks | |||
S59 [76] | ✓ | RTCIA; RSCA; DIA | |||
S60 [59] | ✓ | Unauthorized intrusions | |||
A1 [67] | ✓ | Intellectual property theft | |||
A2 [37] | ✓ | APTs; contextual anomalies | |||
A3 [38] | ✓ | ✓ | Malware; APTs; enterprise breaches | ||
A4 [49] | ✓ | – | |||
A5 [68] | ✓ | – |
Study | Data Source | Data Type |
---|---|---|
S1 [41] | System Monitoring Data | Application logs; IDS alerts; firewall logs |
S6 [34] | Business Operation Data | Plan number; digital data; plan validation |
S7 [33] | User Activity Logs | Data logs; audit trails; data transfers; network usage |
S9 [36] | Process Monitoring Data | Running-process events |
S10 [91] | Transactional Data | Query logs; login, payment and transfer records |
S13 [53] | Honeypot-Collected Data | Network traffic; logs; attack signatures |
S14 [83] | System Behavior Data | Behaviour of networked systems; events |
S15 [61] | System and User Documents | Configuration files; documents; manuals; e-mail inboxes/outboxes; contact lists |
S16 [82] | System Architecture and User Activity | Ordinary user activity; enterprise-architecture repository |
S17 [85] | Compliance and Configuration Data | Rule results: pass, fail, error, unknown, not applicable, not checked, not selected, informational, fixed |
S18 [71] | Mobile-Application Usage Data | System calls; network traffic; user interactions |
S19 [88] | Incident-Response Data | Probability; mean and standard deviation of time to breach |
S21 [62] | Security Event Data | Manual input; sensors; network-scanning tools; SIEM system |
S22 [90] | Windows System Logs and Dataset | Windows-firewall, event, application, and web logs |
S23 [54] | User-Experience Data | Login logs; application logs; program errors; hardware interrupts |
S24 [100] | Security-Incident Data | IDS alerts; audit logs |
S25 [89] | Interview Findings | Qualitative interview results |
S26 [94] | Windows Module Data | Black-listed and white-listed modules |
S30 [47] | Security Event Data | Logs from hosts, domain controllers, other log-management systems |
S31 [55] | User Behaviour Data | Software, hardware, and system logs |
S32 [45] | Unstructured System Data | Standard syslogs; legacy-application logs |
S34 [56] | Virtual-Machine Monitoring Data | Network and application logs |
S35 [102] | Network Configuration Data | Topology; configurations; vulnerability information |
S36 [63] | Web-Usage Data | Access information; registration days; login time; permission level; client browser; source IP; login mailbox; continuous-login days |
S37 [73] | Web-Usage Data | URL sequences |
S38 [60] | Public Dataset | Application, event, firewall, and other security logs |
S39 [72] | Public Dataset | PCAP-format files |
S40 [52] | Scan-Report Data | VMs, hosts, connectivity, per-VM vulnerabilities |
S41 [77] | Scan-Report Data | Logs; vulnerabilities; host configuration and network topology |
S42 [57] | Unstructured System Data | Open-source Hadoop log dataset |
S44 [84] | SIEM / ICS / SCADA Data | Network traffic; configuration information |
S45 [78] | IAM Event Data | Event logs |
S46 [64] | System Monitoring Data | Network, process and file events |
S47 [65] | Network-Traffic Data | IP address; port; protocol; log file |
S48 [92] | Device and Scan-Report Data | Relationship; type; service and vulnerability info |
S49 [79] | Event and Scan-Report Data | Network traffic; logs |
S51 [86] | Security Policy Data | Network elements; security policy definitions |
S53 [74] | Operation and Transaction Data | Network traffic; click-stream; event logs; transaction records |
S55 [66] | Attack Event Data | Persistent attack records; logs |
S56 [75] | IDS Alert Data | Threat alert logs |
S60 [59] | Network and System Monitoring Data | Captured packets; log files; alerts |
A1 [67] | Business and IT Infrastructure Data | Device inventory; log data; ERP-system data |
A2 [37] | SIEM Data | Logs; network and device events |
A3 [38] | Security Control Data | Logs from web proxies; domain controllers; anti-virus software |
A4 [49] | Network Traffic Data | PCAP log files |
A5 [68] | Syslog and SNMP Data | Server, anti-viruses, system and network events/logs |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Le, T.D.; Le-Dinh, T.; Uwizeyemungu, S. Cybersecurity Analytics for the Enterprise Environment: A Systematic Literature Review. Electronics 2025, 14, 2252. https://doi.org/10.3390/electronics14112252
Le TD, Le-Dinh T, Uwizeyemungu S. Cybersecurity Analytics for the Enterprise Environment: A Systematic Literature Review. Electronics. 2025; 14(11):2252. https://doi.org/10.3390/electronics14112252
Chicago/Turabian StyleLe, Tran Duc, Thang Le-Dinh, and Sylvestre Uwizeyemungu. 2025. "Cybersecurity Analytics for the Enterprise Environment: A Systematic Literature Review" Electronics 14, no. 11: 2252. https://doi.org/10.3390/electronics14112252
APA StyleLe, T. D., Le-Dinh, T., & Uwizeyemungu, S. (2025). Cybersecurity Analytics for the Enterprise Environment: A Systematic Literature Review. Electronics, 14(11), 2252. https://doi.org/10.3390/electronics14112252