ing their experience of managing and processing of data, in ways not available before.
Actually, linked data provide the capacity for establishing association links among
concepts in different datasets, producing high-quality interlinked versions of semanti-
cally linked web datasets and promoting their use in new cross-domain applications by
developers across the globe. Such interlinked datasets constitute valuable input for the
initiation of an analytics extraction process and can lead to the realization of analysis
that was not envisaged in the past.
In the cyber security domain, linked data can be used towards the appropriate inter-
connection of available entities/concepts among different cyber security models.
Linked data analysis provides cyber experts and incident responders a way to quickly
identify the important assets, actors, and events relevant to their organization, accen-
tuating the natural connections between them and providing contextual perspective.
With this added context, it becomes much easier to see abnormal activity and assess
the blast radius of an attack [1]. However, the power of linked data can be fully ex-
ploited, given the existence of significant amount of data, made available by public
organizations and enterprises. Open data publication and consumption schemes have
to be adopted and widely used for the aggregation of cyber security associated data in
open repositories. Over such repositories, queries on the available open data or inter-
linking of data for advanced queries can be applied. The wide adoption of open data
technologies can facilitate the appropriate dissemination of information with regards
to new threats and vulnerabilities, the realisation of advanced analysis taking into
account available data from other sources as well as the shaping of communities of
practice and the engagement of “non-experts” in the cyber security domain.
Extraction of knowledge and management of the available information upon the
mapped/interlinked data can be realised through the application of novel analysis
techniques as well as the development of user-friendly analytics and visualisation
tools. Novel analytic and visualisation approaches have to be introduced and provided
to end users through user-friendly tools. Analysis has not only to focus on extraction
of conclusions and results based on experiences from previous threats, attacks and
risks. A set of analytics for identification of malicious behaviours, anomaly detection,
identification of epidemiological incidents etc. has to be supported even for decisions
that have to be made in real time. This is not to say that preventive measures are use-
less, but instead that organizations must arm themselves with proficient detection and
response practices for readiness in the inevitable event that prevention fails [1].
Going one step further, such tools have to support functionalities for the extraction
of linked data analytics [2], given that analytics are in most cases related with the
processing of data coming from various data sources that include structured and un-
structured data. In order to get insight through the analysis results, appropriate input
has to be provided that in many cases has to combine data from diverse data sources
(e.g. data derived from endpoints in different geographical areas). Thus, there is in-
herent a need for applying novel techniques in order to harvest complex and heteroge-
neous datasets, turn them into insights and make decisions.
Taking into account the afore-mentioned challenges and enabling technologies for
overcoming part of them, it could be claimed that there is open space for the design,
development and validation of novel information driver cyber security management
solutions that can unleash the potential of the processing of huge amount of the avail-
able information. In the current manuscript, such an approach is presented based on
5
Information Driven Cyber Security Management through LinDA
5