Methodologies for Predicting Cybersecurity Incidents
Main Article Content
Abstract
Data science may be used to detect, prevent, and address ever-evolving cybersecurity risks. CSDS is a fast developing field. When it comes to cybersecurity, CSDS emphasises the use of data, concentrates on generating warnings that are specific to a particular threat and uses inferential methods to categorise user behaviour in the process of attempting to enhance cybersecurity operations. Data science is at the heart of recent developments in cybersecurity technology and operations. Automation and intelligence in security systems are only possible through the extraction of patterns and insights from cybersecurity data, as well as the creation of data-driven models that reflect those patterns and insights An attempt is made in this work to describe the various data-driven research approaches with a focus on security. In accordance with the phases of the technique, each work that anticipates cyber-incidents is thoroughly investigated to create an automated and intelligent security system.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
What is data science?: a complete data science tutorial for beginners [Blog]. Retrieved 8. 10. 2019 from https://data-flair.training/blogs/what-is-datascience/. 3. Dhar, V. (2013).
Brodie, M.L. (2015). Understanding Data Science: An Emerging Discipline for Data-Intensive Discovery, in Shannon Cutt (ed.), Getting Data Right: Tackling the Challenges of Big Data Volume and Variety, O’Reilly Media, Sebastopol, CA, USA, June 2015.
Gregory Piatetsky, KDnuggets, https://www.kdnuggets.com/tag/data-science
Harvard Data Science Initiative https://datascience.harvard.edu
ax J, Sanders H. Malware data science: Attack detection and attribution, 2018.
K. Soska and N. Christin, “Automatically detecting vulnerable websites before they turn malicious,” in Proc. USENIX Security Symp., 2014, pp. 625–640.
K. Borgolte, C. Kruegel, and G. Vigna, “Delta: Automatic identification of unknown Web-based infection campaigns,” in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2013, pp. 109–120. [CrossRef]
Y. Liu et al., “Cloudy with a chance of breach: Forecasting cyber security
A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Commun. Surveys Tuts., vol. 18, no. 2, pp. 1153–1176, 2nd Quart., 2016. [CrossRef]
G. Lin et al., “Cross-project transfer representation learning for vulnerable function discovery,” IEEE Trans. Ind. Information., vol. 14, no. 7, pp. 3289–3297, Jul. 2018. [CrossRef]
L. Bilge, Y. Han, and M. Dell’Amico, “RiskTeller: Predicting the risk of cyber incidents,” in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2017, pp. 1299–1311. [CrossRef]
J. Zhang, Z. Durumeric, M. Bailey, M. Liu, and M. Karir, “On the mismanagement and maliciousness of networks,” in Proc. Symp. Netw. Distrib. Syst. Security (NDSS), 2014, pp. 1–12. [CrossRef]
R. A. Rossi, B. Gallagher, J. Neville, and K. Henderson, “Modeling dynamic behavior in large evolving graphs,” in Proc. 6th ACM Int. Conf. Web Search Data Min., 2013, pp. 667–676. [CrossRef]
S. Banescu, C. Collberg, and A. Pretschner, “Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning,” in Proc. 26th USENIX Security Symp., 2017, pp. 661–678. [CrossRef]
D. Kong, L. Cen, and H. Jin, “AUTOREB: Automatically understanding the review-to-behavior fidelity in Android applications,” in Proc. 22nd ACM SIGSAC Conf. Comput. Commun. Security, 2015, pp. 530–541. [CrossRef]
R. P. Khandpur et al., “Crowdsourcing Cybersecurity: Cyber attack detection using social media,” in Proc. ACM Conf. Inf. Knowl. Manag., 2017, pp. 1049–1057. [CrossRef]
AusCERT Team. Russert Is a Leading Cyber Emergency Response Team (CERT) in Australia and the Asia/Pacific Region. Accessed: Apr. 3, 2018. [Online]. Available: http://www.auscert.org.au/
TS Institute. Computer Security Incident Handling Step-by-Step. Accessed: Apr. 3, 2018. [Online]. Available: https://www.sans.org/ reading-room/whitepapers/incident/incident handlers-handbook-33901
G. Killcrece, K.-P. Kossakowski, R. Ruefle, and M. Zajicek, “State of the practice of computer security incident response teams (CSIRTs),” CSIRT Develop. Team, Waldorf, MD, USA, Rep. CMU/SEI-2003-TR-001, 2003. [CrossRef]
I. David and S. Karl, Computer Crime: A Crime Fighter’s Handbook. Sebastopol, CA, USA: O’Reilly Assoc., 1995.
T. Grance, K. Kent, and B. Kim, “Computer security incident handling guide,” document SP 800-61, NIST, Gaithersburg, MD, USA, 2004. [CrossRef]
W. R. Cheswick, S. M. Bellovin, and A. D. Rubin, Firewalls and Internet Security: Repelling the Wily Hacker. Boston, MA, USA: Addison-Wesley, 2003.
W. Stallings, Network and Internetwork Security: Principles and Practice, vol. 1. Englewood Cliffs, NJ, USA: Prentice-Hall, 1995.
F. B. Cohen and F. B. Cohen, Protection, and Security on the Information Superhighway. New York, NY, USA: Wiley, 1995.
J. Li, Y. Zhang, X. Chen, and Y. Xiang, “Secure attribute-based data sharing for resource-limited users in cloud computing,” Comput. Security, vol. 72, pp. 1–12, Jan. 2018. [CrossRef]
S. J. Russell and P. Norvig, Artificial Intelligence: A Modern Approach. Kuala Lumpur, Malaysia: Pearson Edu. Ltd., 2016.
2018 Verizon Annual Data Breach Investigations Report. Accessed: Sep. 13, 2018. [Online]. Available: https://www.verizonenterprise.com/ verizon-insights-lab/dbir/
Y. Bengio, A. Courville, and P. Vincent, “Representation learning: A review and new perspectives,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 35, no. 8, pp. 1798–1828, Aug. 2013. [CrossRef]
A. Ng. (2013). Machine Learning and AI Via Brain Simulations. Accessed: May 3, 2018. [Online]. Available: http://ai.stanford.edu/Ëoeang/slides/DeepLearning-Mar2013.pptx
J. Mairal, J. Ponce, G. Sapiro, A. Zisserman, and F. R. Bach, “Supervised dictionary learning,” in Proc. Adv. Neural Inf. Process. Syst., 2009, pp. 1033–1040.
S. Wold, K. Esbensen, and P. Geladi, “Principal component analysis,” Chemometrics Intell. Lab. Syst., vol. 2, nos. 1–3, pp. 37–52, 1987. [CrossRef]
S. Tokui, K. Oono, S. Hido, and J. Clayton, “Chainer: A next-generation open-source framework for deep learning,” in Proc. Workshop Mach. Learn. Syst. (LearningSys) 29th Annu. Conf. Neural Inf. Process. Syst. (NIPS), vol. 5, 2015, pp. 1–6.
M. M. Najafabadi et al., “Deep learning applications and challenges in big data analytics,” J. Big Data, vol. 2, no. 1, p. 1, 2015. [CrossRef]
B. Feng, Q. Fu, M. Dong, D. Guo, and Q. Li, “Multistage and elastic spam detection in mobile social networks through deep learning,” IEEE Netw., vol. 32, no. 4, pp. 15–21, Jul./Aug. 2018. [CrossRef]
H. Li, K. Ota, and M. Dong, “Learning IoT in edge: Deep learning for the Internet of Things with edge computing,” IEEE Netw., vol. 32, no. 1, pp. 96–101, Jan./Feb. 2018. [CrossRef]
L. Li, K. Ota, and M. Dong, “When weather matters: IoT-based electrical load forecasting for smart grid,” IEEE Commun. Mag., vol. 55, no. 10, pp. 46–51, Oct. 2017. [CrossRef]
Ask questions to make a Data-Driven Decision course by Google.