Survey of Attack Projection, Prediction, and Forecasting in Cyber Security

作者: Martin Husak , Jana Komarkova , Elias Bou-Harb , Pavel Celeda

DOI: 10.1109/COMST.2018.2871866

关键词:

摘要: … predict upcoming cyber attacks, and network security situation forecasting, in which we project … In this work, sequential pattern mining is used to extract attack scenarios, which are then …

参考文章(107)
Aman Jantan, Mohammad Rasmi, Mohd Izham Ibrahim, Azri H. A. Rahman, A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics International Conference on Security in Computer Networks and Distributed Systems. pp. 336- 346 ,(2012) , 10.1007/978-3-642-34135-9_34
Alexander Kott, Towards Fundamental Science of Cyber Security Network Science and Cybersecurity. pp. 1- 13 ,(2014) , 10.1007/978-1-4614-7597-2_1
M. Rasmi, Aman Jantan, Attack Intention Analysis Model for Network Forensics international conference on software engineering and computer systems. pp. 403- 411 ,(2011) , 10.1007/978-3-642-22191-0_35
Radek Píbil, Viliam Lisý, Christopher Kiekintveld, Branislav Bošanský, Michal Pěchouček, Game theoretic model of strategic honeypot selection in computer networks decision and game theory for security. pp. 201- 220 ,(2012) , 10.1007/978-3-642-34266-0_12
Yu-Beng Leau, Selvakumar Manickam, Network Security Situation Prediction: A Review and Discussion soft computing. pp. 424- 435 ,(2015) , 10.1007/978-3-662-46742-8_39
Ruijuan Zheng, Dan Zhang, Qingtao Wu, Mingchuan Zhang, Chunlei Yang, A Strategy of Network Security Situation Autonomic Awareness international conference on network computing and information security. pp. 632- 639 ,(2012) , 10.1007/978-3-642-35211-9_80
Mohammad Khansari, Maryam AmirHaeri, Hamid Farhadi, Alert Correlation and Prediction Using Data Mining and HMM The ISC International Journal of Information Security. ,vol. 3, pp. 77- 101 ,(2011) , 10.22042/ISECURE.2015.3.2.3
Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael Bailey, Mingyan Liu, None, Cloudy with a chance of breach: forecasting cyber security incidents usenix security symposium. pp. 1009- 1024 ,(2015)
Kyle Soska, Nicolas Christin, Automatically detecting vulnerable websites before they turn malicious usenix security symposium. pp. 625- 640 ,(2014)
Yaxing Zhang, Shuyuan Jin, Xiang Cui, Xi Yin, Yi Pang, Network Security Situation Prediction Based on BP and RBF Neural Network Trustworthy Computing and Services. pp. 659- 665 ,(2013) , 10.1007/978-3-642-35795-4_83