A comprehensive survey of manual and dynamic approaches for cybersecurity taxonomy generation

被引:0
|
作者
Spyros, Arnolnt [1 ]
Kougioumtzidou, Anna [1 ]
Papoutsis, Angelos [1 ]
Darra, Eleni [1 ]
Kavallieros, Dimitrios [1 ]
Tziouvaras, Athanasios [2 ]
Tsikrika, Theodora [1 ]
Vrochidis, Stefanos [1 ]
Kompatsiaris, Ioannis [1 ]
机构
[1] Ctr Res & Technol Hellas, Informat Technol Inst, 6th Km Harilaou Thermis, Thessaloniki 57001, Central Macedon, Greece
[2] Business & IoT Integrated Solut Ltd, Dept, Kypranoros 13, CY-1061 Nicosia, Cyprus
基金
欧盟地平线“2020”;
关键词
Cybersecurity; Taxonomy; Manual taxonomy; Dynamic taxonomy; Cybersecurity datasets; CHAIN-BASED TAXONOMY; CYBER; THREATS; INTELLIGENCE; ATTACKS; CLASSIFICATION; CHALLENGES; NETWORKS;
D O I
10.1007/s10115-025-02382-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The aim of this work is to provide a systematic literature review of techniques for taxonomy generation across the cybersecurity domain. Cybersecurity taxonomies can be classified into manual and dynamic, each one of which focuses on different characteristics and tails different goals. Under this premise, we investigate the current state of the art in both categories with respect to their characteristics, applications and methods. To this end, we perform a systematic literature review in accordance with an extensive analysis of the tremendous need for dynamic taxonomies in the cybersecurity landscape. This analysis provides key insights into the advantages and limitations of both techniques, and it discusses the datasets which are most commonly used to generate cybersecurity taxonomies.
引用
收藏
页数:27
相关论文
共 50 条
  • [11] A Comprehensive Technical Survey of Contemporary Cybersecurity Products and Solutions
    Tselios, Christos
    Tsolis, George
    Athanatos, Manos
    COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 3 - 18
  • [12] Towards a taxonomy of dynamic reconfiguration approaches
    Eddin, Mohammad Charaf
    Journal of Software, 2013, 8 (09) : 2202 - 2207
  • [13] A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
    Pawlick, Jeffrey
    Colbert, Edward
    Zhu, Quanyan
    ACM COMPUTING SURVEYS, 2019, 52 (04)
  • [14] An End-to-End Framework for Cybersecurity Taxonomy and Ontology Generation and Updating
    Kougioumtzidou, Anna
    Papoutsis, Angelos
    Kavallieros, Dimatios
    Mavropoulos, Thanassis
    Tsikrika, Theodora
    Vrochidis, Stefanos
    Kompatsiaris, Ioannis
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 247 - 254
  • [15] A comprehensive survey and taxonomy of sign language research
    El-Alfy, El-Sayed M.
    Luqman, Hamzah
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2022, 114
  • [16] A comprehensive survey and taxonomy of sign language research
    El-Alfy, El-Sayed M.
    Luqman, Hamzah
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2022, 114
  • [17] Secret sharing: A comprehensive survey, taxonomy and applications
    Chattopadhyay, Arup Kumar
    Saha, Sanchita
    Nag, Amitava
    Nandi, Sukumar
    COMPUTER SCIENCE REVIEW, 2024, 51
  • [18] A comprehensive survey of machine remaining useful life prediction approaches based on pattern recognition: taxonomy and challenges
    Zhou, Jianghong
    Yang, Jiahong
    Qian, Quan
    Qin, Yi
    MEASUREMENT SCIENCE AND TECHNOLOGY, 2024, 35 (06)
  • [19] A Taxonomy and Survey of Semantic Approaches for Query Expansion
    Raza, Muhammad Ahsan
    Mokhtar, Rahmah
    Ahmad, Noraziah
    Pasha, Maruf
    Pasha, Urooj
    IEEE ACCESS, 2019, 7 : 17823 - 17833
  • [20] A Taxonomy and Survey of Dynamic Graph Visualization
    Beck, Fabian
    Burch, Michael
    Diehl, Stephan
    Weiskopf, Daniel
    COMPUTER GRAPHICS FORUM, 2017, 36 (01) : 133 - 159