A Study of Data Fusion for Predicting Novel Activity in Enterprise Cyber-Security

被引:0
|
作者
Hogan, Jack [1 ]
Adams, Niall M. [1 ,2 ]
机构
[1] Imperial Coll London, Dept Math, London, England
[2] Imperial Coll London, Data Sci Inst, London, England
关键词
LINK-PREDICTION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Modern computer networks allow for the collection of vast amounts of data. A wide variety of sources record data relating to different aspects of computer and network activity. This wealth of available data, coupled with the persistent rise in successful cyber-security breaches, motivates the need for data driven approaches to complement existing cyber-defence systems. Although obtainable, most of this data remains unexploited due to issues of data collection and privacy concerns. The majority of research has therefore been constrained to utilise limited data sets, usually obtained from only one of the many available data sources. We use a recently assembled public domain data set, which associates data from multiple sources in a real-world enterprise computer network, to demonstrate the advantages of data and entity fusion for cyber-security. We formulate an anomaly detection task employing time-delayed labels, which enables the use of supervised learning as a means of predicting novel activity. Our results show that an appropriate fusion of data from multiple sources and entities improves predictive accuracy.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 50 条
  • [1] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    [J]. JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [2] An anomaly detection framework for cyber-security data
    Evangelou, Marina
    Adams, Niall M.
    [J]. COMPUTERS & SECURITY, 2020, 97
  • [3] High-Level Information Fusion of Cyber-Security Expert Knowledge and Experimental Data
    Costa, Paulo C. G.
    Yu, Bo
    Atighetchi, Michael
    Myers, David
    [J]. 2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 2322 - 2329
  • [4] Multi-type relational clustering for enterprise cyber-security networks
    Riddle-Workman, Elizabeth
    Evangelou, Marina
    Adams, Niall M.
    [J]. PATTERN RECOGNITION LETTERS, 2021, 149 : 172 - 178
  • [5] A study on cyber-security of autonomous and unmanned vehicles
    Yagdereli, Eray
    Gemci, Cemal
    Aktas, A. Ziya
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 369 - 381
  • [6] Analysis and Parsing of Unstructured Cyber-Security Incident Data
    Ochoa, Armando J.
    Finlayson, Mark A.
    [J]. PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 345 - 346
  • [7] Ontology-Driven Data Semantics Discovery for Cyber-Security
    Balduccini, Marcello
    Kushner, Sarah
    Speck, Jacquelin
    [J]. PRACTICAL ASPECTS OF DECLARATIVE LANGUAGES, PADL 2015, 2015, 9131 : 1 - 16
  • [8] An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management
    Gupta, Kishu
    Saxena, Deepika
    Rani, Pooja
    Kumar, Jitendra
    Makkar, Aaisha
    Singh, Ashutosh Kumar
    Lee, Chung-Nan
    [J]. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024,
  • [9] Teaching Cyber-Security for Distance Learners: A Reflective Study
    Ahmed, Ali
    Lundqvist, Karsten
    Watterson, Craig
    Baghaei, Nilufar
    [J]. 2020 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE 2020), 2020,
  • [10] Data Driven Cyber-Security Corporate Systems: Development and Implementation
    Efimova, Yulia
    Gavrilov, Artem
    Svirina, Anna
    [J]. VISION 2025: EDUCATION EXCELLENCE AND MANAGEMENT OF INNOVATIONS THROUGH SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE, 2019, : 6768 - 6775