Computational Techniques for Predicting Cyber Threats

作者: Ekta Gandotra , Divya Bansal , Sanjeev Sofat

DOI: 10.1007/978-81-322-2012-1_26

关键词: Cyber infrastructureComputer securityCompetence (human resources)Future studiesInternet usersCyber threatsThe InternetProtection systemComputer science

摘要: With the increasing usage of Internet and computing devices with network competence, crimes cyber attacks are exponentially. Most existing detection protection systems rely on signature based methods unable to detect sophisticated targeted like advanced persistent threats (APTs). In order protect users infrastructure from various threats, proactive defense required, which have capability make intelligent decisions in real time. This paper reviews computational techniques used literature for predicting threats. It also highlights challenges, can be explored by researchers future studies.

参考文章(23)
Timothy L. Thomas, Google Confronts China’s “Three Warfares” Parameters. ,vol. 40, pp. 101- ,(2010)
Mohammad Khansari, Maryam AmirHaeri, Hamid Farhadi, Alert Correlation and Prediction Using Data Mining and HMM The ISC International Journal of Information Security. ,vol. 3, pp. 77- 101 ,(2011) , 10.22042/ISECURE.2015.3.2.3
Hyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In, Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis information security conference. pp. 376- 387 ,(2012) , 10.1007/978-3-642-30436-1_31
Dapeng Man, Yan Wang, Wu Yang, Wei Wang, A Combined Prediction Method for Network Security Situation 2010 International Conference on Computational Intelligence and Software Engineering. pp. 1- 4 ,(2010) , 10.1109/CISE.2010.5676911
D.S. Fava, S.R. Byers, S.J. Yang, Projecting Cyberattacks Through Variable-Length Markov Models IEEE Transactions on Information Forensics and Security. ,vol. 3, pp. 359- 369 ,(2008) , 10.1109/TIFS.2008.924605
Jinyu Wu, Lihua Yin, Yunchuan Guo, Cyber Attacks Prediction Model Based on Bayesian Network international conference on parallel and distributed systems. pp. 730- 731 ,(2012) , 10.1109/ICPADS.2012.117
Claude Fachkha, Elias Bou-Harb, Mourad Debbabi, Towards a Forecasting Model for Distributed Denial of Service Activities network computing and applications. pp. 110- 117 ,(2013) , 10.1109/NCA.2013.13
Ekta Gandotra, Divya Bansal, Sanjeev Sofat, Malware Analysis and Classification: A Survey Journal of Information Security. ,vol. 5, pp. 56- 64 ,(2014) , 10.4236/JIS.2014.52006