Reasoning About Future Cyber-Attacks Through Socio-Technical Hacking Information

被引:3
|
作者
Marin, Ericsson [1 ]
Almukaynizi, Mohammed [1 ]
Shakarian, Paulo [1 ,2 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
[2] Cyber Reconnaissance Inc, Tempe, AZ USA
来源
2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019) | 2019年
关键词
Temporal Logic; AI; Cybersecurity; Darkweb;
D O I
10.1109/ICTAI.2019.00030
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the widespread of cyber-attack incidents, cybersecurity has become a major concern for organizations. The waste of time, money and resources while organizations counter irrelevant cyber threats can turn them into the next victim of malicious hackers. In addition, the online hacking community has grown rapidly, making the cyber threat landscape hard to keep track of. In this work, we describe an AI tool that uses a temporal logical framework to learn rules that correlate malicious hacking activity with real-world cyber incidents, aiming to leverage these rules for predicting future cyber-attacks. The framework considers socio-personal and technical indicators of enterprise attacks, analyzing the hackers and their strategies when they are planning cyber offensives online. Our results demonstrate the viability of the proposed approach, which outperforms baseline systems by an average Fl score increase of 138%, 71% and 17% for intervals of 1, 2 and 3 days respectively, providing security teams mechanisms to predict and avoid cyber-attacks.
引用
收藏
页码:157 / 164
页数:8
相关论文
共 50 条
  • [21] Predictions of Cybersecurity Experts on Future Cyber-Attacks and Related Cybersecurity Measures
    AL-Hawamleh, Ahmad Mtair
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (02) : 801 - 809
  • [22] A socio-technical perspective to counter cyber-enabled industrial espionage
    Sadok, Moufida
    Welch, Christine
    Bednar, Peter
    SECURITY JOURNAL, 2020, 33 (01) : 27 - 42
  • [23] Socio-Technical Influences of Cyber Espionage: A Case Study of the GhostNet System
    Lin, Xue
    Luppicini, Rocci
    INTERNATIONAL JOURNAL OF TECHNOETHICS, 2011, 2 (02) : 65 - 77
  • [24] A socio-technical perspective to counter cyber-enabled industrial espionage
    Moufida Sadok
    Christine Welch
    Peter Bednar
    Security Journal, 2020, 33 : 27 - 42
  • [25] Information technology in health care: Socio-technical approaches
    Aarts, Jos
    Callen, Joanne
    Coiera, Enrico
    Westbrook, Johanna
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2010, 79 (06) : 389 - 390
  • [26] Information context and socio-technical practice of digital nomads
    Al-Hadi, Nehad Ali
    Al-Aufi, Ali Saif
    GLOBAL KNOWLEDGE MEMORY AND COMMUNICATION, 2019, 68 (4-5) : 431 - 450
  • [27] Increasing Information in Socio-Technical MAS Considered Contentious
    Nallur, Vivek
    Monteil, Julien
    Sammons, Tyler
    Bouroche, Melanie
    Clarke, Siobhan
    2015 IEEE NINTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS (SASOW), 2015, : 25 - 30
  • [28] Socio-technical issues for ubiquitous information society in 2010
    Funabashi, M
    Homma, K
    Sasaki, T
    Sato, Y
    Kido, K
    Fukumoto, T
    Yano, K
    INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 1978 - 1983
  • [29] Information architectures: a framework for understanding socio-technical systems
    Paul E. Smaldino
    Adam Russell
    Matthew R. Zefferman
    Judith Donath
    Jacob G. Foster
    Douglas Guilbeault
    Martin Hilbert
    Elizabeth A. Hobson
    Kristina Lerman
    Helena Miton
    Cody Moser
    Jana Lasser
    Sonja Schmer-Galunder
    Jacob N. Shapiro
    Qiankun Zhong
    Dan Patt
    npj Complexity, 2 (1):
  • [30] The socio-technical design of a library and information science collaboratory
    Lassi, Monica
    Sonnenwald, Diane H.
    INFORMATION RESEARCH-AN INTERNATIONAL ELECTRONIC JOURNAL, 2013, 18 (02):