Chapter 29 Cognitive Computing and Multiscale Analysis for Cyber Security Sana Siddiqui, Muhammad Salman Khan, and Ken Ferens 29.1 Cyber-Threat Landscape The pervasive role and contribution of the Internet in our daily lives have made us more susceptible to cyber-attacks. From malware, web based attacks, botnets, phishing to ransomware, and cyber-espionage, the field of cyber-threats is multi- faceted. In 2015 alone, a zero-day vulnerability was found every week on average and nine breaches with over 10 million records per breach were reported. Also, more than one million users became the target of web attacks daily while in general, a large organization observed at least 3.6 successful average attacks; and the deadly ransomware increased by 35% from the previous year [1]. Moreover, malware which has consecutively topped the list of cyber-threats within past few years has observed an increase of one million samples per day [2]. Also, in 2016 alone, average 58 thousand new malicious URLs were found every day [2] which are major source of web based attacks. Further, an extreme volumetric surge in denial of service (DoS) attacks was observed reaching bandwidths of 100 Gbps [2]. Exploit kits (e.g., rootkits) based malicious activities have increased by almost 67% [2]. Overall, there was a reported increase of 64% in security related incidents [3] with varying motives including but not limited to financial gain, physical harm, intellectual property theft, and political damage. It is worth-noting that healthcare was the most frequently targeted industry in addition to government, financial services, educational organization, and manufacturing industries [3, 4]. Also, the biggest risks for any organization remain the insider-threat which was the source of S. Siddiqui () • M.S. Khan • K. Ferens Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada e-mail: siddiqu5@myumanitoba.ca; muhammadsalman.khan@umanitoba.ca; ken.ferens@umanitoba.ca © Springer International Publishing AG 2018 K. Daimi (ed.), Computer and Network Security Essentials, DOI 10.1007/978-3-319-58424-9_29 507