Reasoning About Future Cyber-Attacks Through Socio-Technical Hacking Information

被引:3
|
作者
Marin, Ericsson [1 ]
Almukaynizi, Mohammed [1 ]
Shakarian, Paulo [1 ,2 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
[2] Cyber Reconnaissance Inc, Tempe, AZ USA
来源
2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019) | 2019年
关键词
Temporal Logic; AI; Cybersecurity; Darkweb;
D O I
10.1109/ICTAI.2019.00030
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the widespread of cyber-attack incidents, cybersecurity has become a major concern for organizations. The waste of time, money and resources while organizations counter irrelevant cyber threats can turn them into the next victim of malicious hackers. In addition, the online hacking community has grown rapidly, making the cyber threat landscape hard to keep track of. In this work, we describe an AI tool that uses a temporal logical framework to learn rules that correlate malicious hacking activity with real-world cyber incidents, aiming to leverage these rules for predicting future cyber-attacks. The framework considers socio-personal and technical indicators of enterprise attacks, analyzing the hackers and their strategies when they are planning cyber offensives online. Our results demonstrate the viability of the proposed approach, which outperforms baseline systems by an average Fl score increase of 138%, 71% and 17% for intervals of 1, 2 and 3 days respectively, providing security teams mechanisms to predict and avoid cyber-attacks.
引用
收藏
页码:157 / 164
页数:8
相关论文
共 50 条
  • [31] Social networks and socio-technical information systems research
    Recherche sur les réseaux sociaux et les systèmes d'information socio-techniques
    Oinas-kukkonen, H. (Harri.Oinas-Kukkonen@oulu.fi), 1600, Lavoisier, 14 rue de Provigny, Cachan Cedex, F-94236, France (17):
  • [32] Structured Reasoning for Socio-Technical Factors of Safety-Security Assurance
    Johnson, Nikita
    Kelly, Tim
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019, 2019, 11699 : 178 - 184
  • [33] A Socio-technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks
    Sittig, Dean F.
    Singh, Hardeep
    APPLIED CLINICAL INFORMATICS, 2016, 7 (02): : 624 - 632
  • [34] Information Security Technology for Computer Networks through Classification of Cyber-Attacks using Soft Computing Algorithms
    Villaluna, Jason A.
    Cruz, Febus Reidj G.
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON HUMANOID, NANOTECHNOLOGY, INFORMATION TECHNOLOGY, COMMUNICATION AND CONTROL, ENVIRONMENT AND MANAGEMENT (IEEE HNICEM), 2017,
  • [35] Modelling Smart Cities Through Socio-Technical Systems
    Santos Cunha, Maria Eduarda
    Rossetti, Rosaldo J. F.
    Campos, Pedro
    2020 IEEE INTERNATIONAL SMART CITIES CONFERENCE (ISC2), 2020,
  • [36] A Socio-Technical Regime Transitions Model for Gerontechnology Service Design: Privacy, Information Security and Cyber Security in Focus
    Kowalski, Stewart James
    Ostby, Grethe
    PHEALTH 2022, 2022, 299 : 20 - 29
  • [37] ETHICS: The Past, Present and Future of Socio-Technical Systems Design
    Leitch, Shona
    Warren, Matthew J.
    HISTORY OF COMPUTING: LEARNING FROM THE PAST, 2010, 325 : 189 - 197
  • [38] Detection of Cyber-Attacks of Power Systems Through Benford's Law
    Milano, Federico
    Gomez-Exposito, Antonio
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (03) : 2741 - 2744
  • [39] Detection of Collaborative Cyber-Attacks through Correlation and Time Dependency Analysis
    Thoma, Marios
    Hadjicostis, Christoforos N.
    PROCEEDINGS OF THE 18TH MEDITERRANEAN ELECTROTECHNICAL CONFERENCE MELECON 2016, 2016,
  • [40] An Agent-Based Socio-Technical Approach to Impact Assessment for Cyber Defense
    Charitoudi, Konstantinia
    Blyth, Andrew J. C.
    INFORMATION SECURITY JOURNAL, 2014, 23 (4-6): : 125 - 136