A genetic epidemiology approach to cyber-security

被引:0
|
作者
Santiago Gil
Alexander Kott
Albert-László Barabási
机构
[1] Center for Complex Network Research,Network Science Division
[2] Northeastern University,Department of Medicine
[3] Seed Scientific,undefined
[4] Army Research Laboratory,undefined
[5] Center for Cancer Systems Biology,undefined
[6] Dana-Farber Cancer Institute,undefined
[7] Brigham and Women's Hospital,undefined
[8] Harvard Medical School,undefined
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.
引用
收藏
相关论文
共 50 条
  • [21] Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph
    Mendsaikhan, Otgonpurev
    Hasegawa, Hirokazu
    Yamaguchi, Yukiko
    Shimada, Hajime
    IEEE ACCESS, 2020, 8 (08): : 177041 - 177052
  • [22] Cyber-Security of Smart Microgrids: A Survey
    Nejabatkhah, Farzam
    Li, Yun Wei
    Liang, Hao
    Reza Ahrabi, Rouzbeh
    ENERGIES, 2021, 14 (01)
  • [23] On SCADA PLC and Fieldbus Cyber-Security
    Davidson, Cordell
    Andel, Todd
    Yampolskiy, Mark
    McDonald, Todd
    Glisson, Brad
    Thomas, Tom
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 140 - 148
  • [24] Cyber-security: Who will provide protection?
    ViaSat, United Kingdom
    Comput. Fraud Secur., 12 (19-20): : 19 - 20
  • [25] Cyber-security in robotics and autonomous systems
    Matellan, Vicente
    Bonaci, Tamara
    Sabaliauskaite, Giedre
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2018, 100 : 41 - 42
  • [26] THE IMPORTANCE AND ROLE OF NATO IN CYBER-SECURITY
    Cioaca, Catalin
    15TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION: MILITARY SCIENCES. SECURITY AND DEFENSE, CONFERENCE PROCEEDINGS 1, 2009, 1 : 158 - 162
  • [27] Cyber-security fortresses built on quicksand
    Flexera Software, United States
    Netw. Secur., 8 (5-8):
  • [28] WHERE NEXT FOR UK CYBER-SECURITY?
    Neville-Jones, Pauline
    Phillips, Mark
    RUSI JOURNAL, 2012, 157 (06): : 32 - 40
  • [29] Cyber-Security Incidents and Audit Quality
    Rosati, Pierangelo
    Gogolin, Fabian
    Lynn, Theo
    EUROPEAN ACCOUNTING REVIEW, 2022, 31 (03) : 701 - 728
  • [30] AI, Connectivity and Cyber-Security in Avionics
    Gatti, Marc
    Damien, Alienor
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 35 - 38