Podrobný výpis o publikaci
2019
Survey of Attack Projection, Prediction, and Forecasting in Cyber Security
HUSÁK, Martin, Jana KOMÁRKOVÁ, Elias BOU-HARB a Pavel ČELEDAZákladní údaje
Originální název
Survey of Attack Projection, Prediction, and Forecasting in Cyber Security
Autoři
HUSÁK, Martin (203 Česká republika, garant, domácí), Jana KOMÁRKOVÁ (203 Česká republika, domácí), Elias BOU-HARB a Pavel ČELEDA (203 Česká republika, domácí)
Vydání
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, PISCATAWAY, IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2019, 1553-877X
Další údaje
Jazyk
angličtina
Typ výsledku
Článek v odborném periodiku
Stát vydavatele
Spojené státy
Utajení
není předmětem státního či obchodního tajemství
Odkazy
Kód RIV
RIV/00216224:14610/19:00108866
Organizace
Ústav výpočetní techniky – Masarykova univerzita – Repozitář
UT WoS
000459730200024
Klíčová slova anglicky
cyber security;intrusion detection;situational awareness;prediction;forecasting;model checking
Návaznosti
EF16_019/0000822, projekt VaV.
Změněno: 6. 9. 2020 06:12, RNDr. Daniel Jakubík
Anotace
V originále
This paper provides a survey of prediction, and forecasting methods used in cyber security. Four main tasks are discussed first, attack projection and intention recognition, in which there is a need to predict the next move or the intentions of the attacker, intrusion prediction, in which there is a need to predict upcoming cyber attacks, and network security situation forecasting, in which we project cybersecurity situation in the whole network. Methods and approaches for addressing these tasks often share the theoretical background and are often complementary. In this survey, both methods based on discrete models, such as attack graphs, Bayesian networks, and Markov models, and continuous models, such as time series and grey models, are surveyed, compared, and contrasted. We further discuss machine learning and data mining approaches, that have gained a lot of attention recently and appears promising for such a constantly changing environment, which is cyber security. The survey also focuses on the practical usability of the methods and problems related to their evaluation.