A social dimensional cyber threat model with formal concept analysis and fact-proposition inference

نویسندگان

  • Anup C. Sharma
  • Robin A. Gandhi
  • Qiuming Zhu
  • William R. Mahoney
  • William L. Sousan
چکیده

Cyberspace has increasingly become a medium to express outrage, conduct protests, take revenge, spread opinions, and stir up issues. Many cyber attacks can be linked to current and historic events in the social, political, economic, and cultural (SPEC) dimensions of human conflicts in the physical world. These SPEC factors are often the root cause of many cyber attacks. Understanding the relationships between past and current SPEC events and cyber attacks can help understand and better prepare people for impending cyber attacks. The focus of this paper is to analyse these attacks in social dimensions and build a threat model based on past and current social events. A reasoning technique based on a novel combination of formal concept analysis (FCA) and hierarchical fact-proposition space (FPS) inference is applied to build the model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Knowledge Based Framework for Cyber Weapons and Conflict

In recent years there have been a number of international conflicts that have been mirrored by a parallel campaign of hostile actions in cyberspace. This, in turn, has prompted various attempts to analyze the phenomenon and explain the threat to the wider public. Unfortunately, however, the reports and analysis are often confusing and can include rather arbitrary use of various cyber “buzz word...

متن کامل

Providing a Desirable Model for Implementing Social Network Policies in Iran (With a social and ethical responsibility approach based on the explanation of its related factors)

Purpose: Cyber social networks and cyberspace are like a double-edged sword that brings favorable and unfavorable consequences. The advantages cannot prevent us from neglecting its dangerous disadvantages that disregard the ethical principles and community values. The present research has been carried out to explain the factors related to the implementation of cyber social network policies in I...

متن کامل

The Model of Structural Relationships of Cyber-Aggression Based on Family Communication Pattern with the Mediating Role of Addiction to Internet

Introduction: Family relationships play an incredibly important role in the lives of individuals and these relationships represent the most enduring social institution This study aimed the model of structural relations of cyber-aggression based on family communication pattern with the mediating  role of addiction to Internet. Methods: This study was descriptive-correlational and the statistical...

متن کامل

حاکمیت شبکه‌ای در نهادهای پژوهشی امنیت ‌سایبری

Governments change their governance style according to social, political and economic conditions. Cyber security technology is among today’s most changeable technologies, which is a critical key to the national security. Because of the weaknesses in the interaction among syber security research organizations, introducing a model for utilizing all existing capabilities can be an appro...

متن کامل

Modeling security in cyber-physical systems

This paper describes a framework for modeling the security of a cyber–physical system in which the behavior of the adversary is controlled by a threat model that captures – in a unified manner – the cyber aspects (with discrete values) and the physical aspects (with continuous values) of the cyber–physical system. In particular, the framework addresses combined (dependent) vector attacks and sy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJICS

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2013