An investigation of using classification techniques in prediction of type of targets in Cyber attacks

被引:0
|
作者
Pournouri, Sina [1 ]
Zargari, Shahrzad [1 ]
Akhgar, Babak [1 ]
机构
[1] Sheffield Hallam Univ, Sheffield, S Yorkshire, England
关键词
Type of Target; Cyber Attack; Classification; Cyber breach; Open Source Intelligence;
D O I
10.1109/icgs3.2019.8688266
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Prediction of type of targets in cyber-attacks can be very important in designing an extensive framework to tackle future cyber incidents. Different sectors based on the nature of their business can be a specific target for some types of cyber-attack. Different businesses need to learn from past mistakes and identify the potential risks and vulnerabilities in order to be prepared against future cyber breaches. This study aims to investigate prediction of type of targets based on classification techniques and Open Source Intelligence.
引用
收藏
页码:122 / 132
页数:11
相关论文
共 50 条
  • [1] Impact Modeling and Prediction of Attacks on Cyber Targets
    Khalili, Aram
    Michalk, Brian
    Alford, Lee
    Henney, Chris
    Gilbert, Logan
    CYBER SECURITY, SITUATION MANAGEMENT, AND IMPACT ASSESSMENT II; AND VISUAL ANALYTICS FOR HOMELAND DEFENSE AND SECURITY II, 2010, 7709
  • [2] Profiling Suspected Chinese Cyber Attacks by Classification Techniques
    Toms, Joel Mathew
    Ghazaani, Setareh Jalali
    Pournouri, Sina
    Ehiorobo, Eghe
    CYBERSECURITY IN THE AGE OF SMART SOCIETIES, 2022, 2023, : 281 - 313
  • [3] SIMULATING NETWORK CYBER ATTACKS USING SPLITTING TECHNIQUES
    Masi, Denise M. B.
    Fischer, Martin J.
    Shortle, John F.
    Chen, Chun-Hung
    PROCEEDINGS OF THE 2011 WINTER SIMULATION CONFERENCE (WSC), 2011, : 3212 - 3223
  • [4] Multiple Classification of Cyber Attacks Using Machine Learning
    Guven, Ebu Yusuf
    Gulgun, Sueda
    Manav, Ceyda
    Bakir, Behice
    Aydin, Zeynep Gurkas
    ELECTRICA, 2022, 22 (02): : 313 - 320
  • [5] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Adam M. Bossler
    American Journal of Criminal Justice, 2021, 46 : 911 - 934
  • [6] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Bossler, Adam M.
    AMERICAN JOURNAL OF CRIMINAL JUSTICE, 2021, 46 (06) : 911 - 934
  • [7] Prediction of Industrial Cyber Attacks Using Normalizing Flows
    V. P. Stepashkina
    M. I. Hushchyn
    Doklady Mathematics, 2024, 110 (Suppl 1) : S95 - S102
  • [8] Sequential Detection of Cyber-attacks Using a Classification Filter
    Cai, Xiaojuan
    Feng, Yaokai
    Sakurai, Kouichi
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 659 - 666
  • [9] Behaviour classification of cyber attacks using convolutional neural networks
    Lin, Wen-Hui
    Wang, Ping
    Lin, Hsiao-Chung
    Wu, Bao-Hua
    Tsai, Jeng-Ying
    Journal of Computers (Taiwan), 2021, 32 (01): : 65 - 82
  • [10] Classification of Cyber Attacks in South Africa
    Van Heerden, Renier
    Von Soms, Sune
    Mooi, Roderick
    2016 IST-AFRICA WEEK CONFERENCE, 2016,