<?xml version="1.0"?>
<!DOCTYPE article SYSTEM "C:\nlm\converter\journal-publishing-dtd-2.0\journalpublishing.dtd">
<article>
<front>
<journal-meta>
<journal-id journal-id-type="publisher">IJDSBDA</journal-id>
<journal-title>International Journal of Data Science and Big Data Analytics</journal-title>
<issn pub-type="epub">2710-2599</issn>
<publisher>
<publisher-name>SvedbergOpen</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="other">ijdsbda-1-1-005</article-id>
<doi-group>
<article-doi><ext-link ext-link-type="uri" xmlns:xlink="https://doi.org/" xlink:href="10.51483/IJDSBDA.1.1.2021.63-79">10.51483/IJDSBDA.1.1.2021.63-79</ext-link></article-doi>
</doi-group>
<article-categories>
<subj-group>
<subject>Review Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Necessity of data science for enhanced Cybersecurity</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Tewari</surname><given-names>Shiv Hari</given-names></name>
<xref ref-type="aff" rid="aff001"><sup>1</sup></xref>
<xref ref-type="corresp" rid="cor001"><sup>*</sup></xref>
</contrib>
</contrib-group>
<aff id="aff001"><sup>1</sup>M.Tech. (CSE), <instname>Birla Institute of Technology, Mesra</instname>, <instcity>Ranchi</instcity>, <instcountry>India</instcountry>. E-mail: <email>tewarishivhari999@gmail.com</email></aff>
<author-notes>
<corresp id="cor001"><sup>*</sup>Corresponding author: Shiv Hari Tewari, M.Tech. (CSE), <instname>Birla Institute of Technology, Mesra</instname>, <instcity>Ranchi</instcity>, <instcountry>India</instcountry>. E-mail: <email>tewarishivhari999@gmail.com</email></corresp>
</author-notes>
<pub-date pub-type="ppub">
<month>02</month>
<year>2021</year>
</pub-date>
<volume>1</volume>
<issue>1</issue>
<fpage>63</fpage>
<lpage>79</lpage>
<abstract>
<title>Abstract</title>
<p>In a computing context, cybersecurity is undergoing massive shifts in technology and its operations in recent days, and data science is driving the change. Extracting security incident patterns or insights from cybersecurity data and building corresponding data-driven model, is the key to make a security system automated and intelligent. To understand and analyze the actual phenomena with data, various scientific methods, machine learning techniques, processes, and systems are used, which is commonly known as data science. In this paper, I have briefly described the data science its evolution its applications in cloud security and how cybersecurity data science came in existence what kind of advantages are given by Cybersecurity Data Science (CSDS) and its steps like, where the data is being gathered from relevant cybersecurity sources, and the analytics complement the latest data-driven patterns for providing more effective security solutions. The concept of cybersecurity data science allows making the computing process more actionable and intelligent as compared to traditional ones in the domain of cybersecurity. After that I have described the various upcoming challenges that can emerge after the frequent applications of CSDS, how machine learning and deep learning are applicable in it and types of algorithms that can be applicable in it. So, the overall paper is not only focuses on the origins of Data Science but it also describes its modern uses for the relevant cybersecurity field and data driven intelligent decision making system can protect our system from known and unknown cyber attacks.</p>
</abstract>
<kwd-group>
<title>Keywords</title>
<kwd>Bitcoin</kwd>
<kwd>cryptocurrencies</kwd>
<kwd>extreme gradient boosting</kwd>
<kwd>deep neural networks</kwd>
</kwd-group>
<counts>
<ref-count count="14"/>
<page-count count="17"/>
</counts>
</article-meta>
</front>
<back>
<ref-list>
<title>References</title>
<ref id="bib001"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Anderson</surname><given-names>Ken</given-names></name> <name><surname>Nafus</surname><given-names>Dawn</given-names></name><name><surname>Rattenbury</surname><given-names>Tye</given-names></name><name><surname>Aipperspach</surname><given-names>Ryan</given-names></name></person-group> (<year>2009</year>). <article-title>Numbers Have Qualities Too: Experiences with Ethno Mining. Ethnographic Praxis in Industry Conference Proceedings</article-title>. <fpage>123</fpage>&#x2013;<lpage>140</lpage>. <pub-id pub-id-type="doi">10.1111/j.1559-8918.2009.tb00133.x</pub-id>.</citation></ref>
<ref id="bib002"><citation citation-type="journal"><person-group person-group-type="author"><name><given-names>Azzah</given-names><surname>Kabbas</surname></name><name><given-names>Atheer</given-names><surname>Alharthi</surname></name><name><given-names>Asmaa</given-names><surname>Munshi</surname></name></person-group> (<year>2020</year>). <article-title>Artificial Intelligence Applications in Cybersecurity</article-title>. <source>International Journal of Computer Science and Network Security</source>. <volume>20</volume>(<issue>2</issue>), <fpage>120</fpage>&#x2013;<lpage>124</lpage>.</citation></ref>
<ref id="bib003"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Devakunchari</surname><given-names>R.</given-names></name><name><surname>Sourabh</surname><given-names>Prakhar Malik</given-names></name></person-group> (<year>2019</year>). <article-title>A Study of Cyber Security using Machine Learning Techniques</article-title>. <source>International Journal of Innovative Technology and Exploring Engineering</source>. <volume>8</volume>(<issue>7C2</issue>), <fpage>183</fpage>&#x2013;<lpage>186</lpage>.</citation></ref>
<ref id="bib004"><citation citation-type="journal"><person-group person-group-type="author"><name><given-names>Faheem</given-names><surname>Ullah</surname></name><name><given-names>Muhammad Ali</given-names><surname>Babar</surname></name></person-group> (<year>2018</year>). <article-title>Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review</article-title>. <source>Journal of Systems and Software</source>. <volume>151</volume>, <fpage>81</fpage>&#x2013;<lpage>118</lpage>.</citation></ref>
<ref id="bib005"><citation citation-type="web"><comment><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.covert.io/security-datascience-papers/">http://www.covert.io/security-datascience-papers/</ext-link></comment> [<article-title>Machine Learning tasks in Cyber Security</article-title>].</citation></ref>
<ref id="bib006"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Iftikhar</surname><given-names>B.</given-names></name><name><surname>Alghamdi</surname><given-names>A.S.</given-names></name></person-group> (<year>2009</year>). <article-title>Application of artificial neural network within the detection of dos attacks</article-title>.</citation></ref>
<ref id="bib007"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Manjeet</surname><given-names>Rege</given-names></name><name><given-names>Raymond Blanch K.</given-names> <surname>Mbah</surname></name></person-group> (<year>2018</year>). <article-title>Machine Learning for Cyber Defense and Attack</article-title>. <source>The Seventh International Conference on Data Analytics</source>. <publisher-loc>Athens, Greece</publisher-loc>.</citation></ref>
<ref id="bib008"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Norvig</surname><given-names>P.</given-names></name><name><surname>Russell</surname><given-names>S.</given-names></name></person-group> (<year>2000</year>). <source>Artificial intelligence: Fashionable approach.A Modern Approach</source>, <edition>Third</edition> Edition. <publisher-name>Artif. Intell</publisher-name>. <volume>175</volume>. <fpage>935</fpage>&#x2013;<lpage>937</lpage>. <pub-id pub-id-type="doi">10.1016/j.artint.2011.01.005</pub-id>.</citation></ref>
<ref id="bib009"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Sarkar</surname><given-names>Iqbal</given-names></name><name><surname>Kayes</surname><given-names>A. S. M.</given-names></name><name><surname>Badsha</surname><given-names>Shahriar</given-names></name><name><surname>Alqahtani</surname><given-names>Hamed</given-names></name><name><surname>Watters</surname><given-names>Paul</given-names></name><name><surname>Ng</surname><given-names>Alex</given-names></name></person-group> (<year>2020a</year>). <article-title>Cybersecurity data science: an overview from machine learning perspective</article-title>. <source>Journal of Big Data</source>. <fpage>7</fpage>. <pub-id pub-id-type="doi">10.1186/s40537-020-00318-5</pub-id>.</citation></ref>
<ref id="bib010"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Sarker</surname><given-names>Iqbal</given-names></name><name><surname>Colman</surname><given-names>Alan</given-names></name><name><surname>Han</surname><given-names>Jun</given-names></name><name><surname>Asif</surname><given-names>Khan</given-names></name><name><given-names>Asif</given-names><surname>Yoosef</surname></name><name><surname>Abushark</surname><given-names>B.</given-names></name><name><surname>Salah</surname><given-names>Khaled</given-names></name></person-group> (<year>2020b</year>). <article-title>BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model</article-title>. <source>Mobile Networks and Applications</source>. <fpage>25</fpage>. <pub-id pub-id-type="doi">10.1007/s11036-019-01443-z</pub-id>.</citation></ref>
<ref id="bib011"><citation citation-type="book"><person-group person-group-type="editor"><name><surname>Sikos</surname><given-names>L.F.</given-names></name><name><surname>Choo</surname><given-names>K.K.R.</given-names></name></person-group> (Eds.). (<year>2020</year>). <source>Data science in cybersecurity and cyberthreat intelligence</source>. <publisher-name>Springer</publisher-name>. <comment><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://doi.org/10.1007/978-3-030-38788-4">https://doi.org/10.1007/978-3-030-38788-4</ext-link></comment></citation></ref>
<ref id="bib012"><citation citation-type="book"><person-group person-group-type="author"><name><given-names>Sumeet</given-names><surname>Dua</surname></name><name><given-names>Xian</given-names><surname>Du</surname></name></person-group> (<year>2011</year>), <source>Data Mining and Machine Learning in Cybersecurity</source>. <edition>1</edition><sup>st</sup> Edition. <publisher-name>Auerbach Publications</publisher-name>, <publisher-loc>New York</publisher-loc>. <comment><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" 
xlink:href="https://doi.org/10.1201/b10867">https://doi.org/10.1201/b10867</ext-link></comment></citation></ref>
<ref id="bib013"><citation citation-type="book"><person-group person-group-type="author"><name><given-names>Tariq</given-names><surname>Mahmood</surname></name><name><given-names>Uzma</given-names><surname>Afzal</surname></name></person-group> (<year>2013</year>). <article-title>Security Analytics: Big Data Analytics for Cybersecurity</article-title>. <publisher-name>IEEE NCIA Conference at Military College of Signals</publisher-name>, <publisher-loc>Rawalpindi, Pakistan</publisher-loc>.</citation></ref>
<ref id="bib014"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Thuraisingham</surname><given-names>Bhavani</given-names></name><name><surname>Khan</surname><given-names>Latifur</given-names></name><name><surname>Masud</surname><given-names>Mehedy</given-names></name><name><surname>Hamlen</surname><given-names>Kevin</given-names></name></person-group> (<year>2008</year>). <article-title>Data Mining for Security Applications</article-title>. <fpage>585</fpage>&#x2013;<lpage>589</lpage>. <pub-id pub-id-type="doi">10.1109/EUC.2008.62</pub-id>.</citation></ref>
</ref-list>
</back>
</article>