Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery

نویسندگان

  • Martín Barrère
  • Gustavo Betarte
  • Víctor Codocedo
  • Marcelo Rodríguez
  • Hernán Astudillo
  • Marcelo Aliquintuy
  • Javier Baliosian
  • Remi Badonnel
  • Olivier Festor
  • Carlos Raniery Paula dos Santos
  • Jéferson Campos Nobre
  • Lisandro Zambenedetti Granville
  • Amedeo Napoli
چکیده

Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them. This complex landscape has made it extremely difficult for security administrators to keep accurate and be effective in protecting their systems against cyber threats. In this paper, we describe our vision and scientific posture on how artificial intelligence techniques and a smart use of security knowledge may assist system administrators in better defending their networks. To that end, we put forward a research roadmap involving three complimentary axes, namely, (I) the use of FCA-based mechanisms for managing configuration vulnerabilities, (II) the exploitation of knowledge representation techniques for automated security reasoning, and (III) the design of a cyber threat intelligence mechanism as a CKDD process. Then, we describe a machine-assisted process for cyber threat analysis which provides a holistic perspective of how these three research axes are integrated together.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards an Operational Semantic Theory of Cyber Defense Against Advanced Persistent Threats

This paper presents current work on developing an operational semantic theory of cyber defense against advanced persistent threats (APTs), which is grounded in cyber threat analytics, science of evidence, knowledge engineering, and machine learning. After introducing advanced persistent threats, it overviews a systematic APT detection framework and the corresponding APT detection models, the fo...

متن کامل

Security Implications of Different Virtualization Approaches for Secure Cyber Architectures

Virtualization is increasingly being used as a component in designing secure cyber architectures. The proposed applications include strong isolation, monitoring, fault tolerance, execution replay, etc. However, there are various virtualization approaches which differ in their security implications, proper applications, overheads, requirements, and most importantly threat models. Firstly, virtua...

متن کامل

Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media

Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine l...

متن کامل

Cyber Medical Education: Beyond the Integration of Concepts in Technology-based Learning

Introduction: Along with the transition from the digital era to the era of cyber-technology, medical professionals have been forced to use different conceptual systems to meet their informational and communicational needs. These emerging scientific concepts each have specific meaning which should be redefined in their own context so that they could be utilized in the conceptual systems of speci...

متن کامل

An Approach to Malware Analysis and Reporting by Machine Learning

Now-a-days cyber security is major concern information and related security areas to protect data from threat. In this context, we frame a methodology by using machine learning to detect various types of Malwares by using machine learning methods. In the present work, we use machine learning approach to the various static and dynamic analysis techniques to discuss different algorithms in cyber ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015