A comprehensive survey of manual and dynamic approaches for cybersecurity taxonomy generation

被引:0
|
作者
Spyros, Arnolnt [1 ]
Kougioumtzidou, Anna [1 ]
Papoutsis, Angelos [1 ]
Darra, Eleni [1 ]
Kavallieros, Dimitrios [1 ]
Tziouvaras, Athanasios [2 ]
Tsikrika, Theodora [1 ]
Vrochidis, Stefanos [1 ]
Kompatsiaris, Ioannis [1 ]
机构
[1] Ctr Res & Technol Hellas, Informat Technol Inst, 6th Km Harilaou Thermis, Thessaloniki 57001, Central Macedon, Greece
[2] Business & IoT Integrated Solut Ltd, Dept, Kypranoros 13, CY-1061 Nicosia, Cyprus
基金
欧盟地平线“2020”;
关键词
Cybersecurity; Taxonomy; Manual taxonomy; Dynamic taxonomy; Cybersecurity datasets; CHAIN-BASED TAXONOMY; CYBER; THREATS; INTELLIGENCE; ATTACKS; CLASSIFICATION; CHALLENGES; NETWORKS;
D O I
10.1007/s10115-025-02382-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The aim of this work is to provide a systematic literature review of techniques for taxonomy generation across the cybersecurity domain. Cybersecurity taxonomies can be classified into manual and dynamic, each one of which focuses on different characteristics and tails different goals. Under this premise, we investigate the current state of the art in both categories with respect to their characteristics, applications and methods. To this end, we perform a systematic literature review in accordance with an extensive analysis of the tremendous need for dynamic taxonomies in the cybersecurity landscape. This analysis provides key insights into the advantages and limitations of both techniques, and it discusses the datasets which are most commonly used to generate cybersecurity taxonomies.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] A comprehensive survey on object detection in Visual Art: taxonomy and challenge
    Siwar Bengamra
    Olfa Mzoughi
    André Bigand
    Ezzeddine Zagrouba
    Multimedia Tools and Applications, 2024, 83 : 14637 - 14670
  • [42] Efficient Big-Data Access: Taxonomy and a Comprehensive Survey
    Alazzawe, Anis
    Pal, Amitangshu
    Kant, Krishna
    IEEE TRANSACTIONS ON BIG DATA, 2022, 8 (02) : 356 - 376
  • [43] A Comprehensive Survey on Deep Clustering: Taxonomy, Challenges, and Future Directions
    Zhou, Sheng
    Xu, Hongjia
    Zheng, Zhuonan
    Chen, Jiawei
    Li, Zhao
    Bu, Jiajun
    Wu, Jia
    Wang, Xin
    Zhu, Wenwu
    Ester, Martin
    ACM COMPUTING SURVEYS, 2025, 57 (03)
  • [44] A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions
    Hazra, Abhishek
    Adhikari, Mainak
    Amgoth, Tarachand
    Srirama, Satish Narayana
    ACM COMPUTING SURVEYS, 2023, 55 (01)
  • [45] A COMPREHENSIVE SURVEY ON MOBILE COMMUNICATION GENERATION
    Nisar, Farhan
    Baseer, Samad
    4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 606 - 611
  • [46] Scene Graph Generation: A comprehensive survey
    Li, Hongsheng
    Zhu, Guangming
    Zhang, Liang
    Jiang, Youliang
    Dang, Yixuan
    Hou, Haoran
    Shen, Peiyi
    Zhao, Xia
    Shah, Syed Afaq Ali
    Bennamoun, Mohammed
    NEUROCOMPUTING, 2024, 566
  • [47] Neural headline generation: A comprehensive survey
    Ren, Han
    Chang, Xiaona
    Li, Xia
    NEUROCOMPUTING, 2025, 635
  • [48] A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things
    Alnajim, Abdullah M.
    Habib, Shabana
    Islam, Muhammad
    Thwin, Su Myat
    Alotaibi, Faisal
    Mahmoud, Mohammed
    TECHNOLOGIES, 2023, 11 (06)
  • [49] A comprehensive survey on human pose estimation approaches
    Shradha Dubey
    Manish Dixit
    Multimedia Systems, 2023, 29 : 167 - 195
  • [50] A COMPREHENSIVE SURVEY ON APPROACHES TO INTRUSION DETECTION SYSTEM
    Deepa, A. J.
    Kavitha, V.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 2063 - 2069