An investigation of using classification techniques in prediction of type of targets in Cyber attacks

被引:0
|
作者
Pournouri, Sina [1 ]
Zargari, Shahrzad [1 ]
Akhgar, Babak [1 ]
机构
[1] Sheffield Hallam Univ, Sheffield, S Yorkshire, England
关键词
Type of Target; Cyber Attack; Classification; Cyber breach; Open Source Intelligence;
D O I
10.1109/icgs3.2019.8688266
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Prediction of type of targets in cyber-attacks can be very important in designing an extensive framework to tackle future cyber incidents. Different sectors based on the nature of their business can be a specific target for some types of cyber-attack. Different businesses need to learn from past mistakes and identify the potential risks and vulnerabilities in order to be prepared against future cyber breaches. This study aims to investigate prediction of type of targets based on classification techniques and Open Source Intelligence.
引用
收藏
页码:122 / 132
页数:11
相关论文
共 50 条
  • [31] Prediction of Hypertension Complications Risk Using Classification Techniques
    Lee, Wonji
    Lee, Junghye
    Lee, Hyeseon
    Jun, Chi-Hyuck
    Park, Il-su
    Kang, Sung-Hong
    INDUSTRIAL ENGINEERING AND MANAGEMENT SYSTEMS, 2014, 13 (04): : 449 - 453
  • [32] Using pattern classification and recognition techniques for diagnostic and prediction
    Morariu, Nicolae
    Vlad, Sorin
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2007, 7 (01) : 63 - 67
  • [33] Prediction of Stroke using Data Mining Classification Techniques
    Almadani, Ohoud
    Alshammari, Riyad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (01) : 457 - 460
  • [34] Tactics And Techniques Classification In Cyber Threat Intelligence
    Yu, Zhongkun
    Wang, JunFeng
    Tang, BinHui
    Lu, Li
    COMPUTER JOURNAL, 2023, 66 (08): : 1870 - 1881
  • [35] A Brief Study Of Intrusion Detection Techniques To Overcome Cyber Attacks
    Sharma, Pradeep Kumar
    Gupta, Aman Kumar
    Chakraborty, Debraj
    Mondal, Pritam Kumar
    Banerjee, Santu
    Chakraborty, Kumardeep
    Dey, Drik
    Chakraborty, Rounak
    Das, Debangshu
    Ghoshal, Tuhin
    Sinha, Anirban
    Mondal, Souvik
    Pal, Soumyadeep
    Sharma, Rahul
    Gorai, Shreyash
    Roy, Suvankar
    Das, Bhaswat Jyoti
    Dey, Aniket
    Sarker, Siddhartha
    Saha, Sourav
    Poddar, Rohan
    Saha, Nabanit
    Dubey, Saurav
    Singh, Rohan
    Das, Surajit
    Hazra, Debanik
    Das, Saikat
    2017 8TH ANNUAL INDUSTRIAL AUTOMATION AND ELECTROMECHANICAL ENGINEERING CONFERENCE (IEMECON), 2017, : 354 - 358
  • [36] Mathematically Modelling Cyber-Attacks Utilizing Engineering Techniques
    Easttom, Chuck
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 119 - 126
  • [37] A survey on Classification of Cyber-attacks on IoT and IIoT devices
    Shah, Yash
    Sengupta, Shamik
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 406 - 413
  • [38] A framework for detection of cyber attacks by the classification of intrusion detection datasets
    Srivastava, Durgesh
    Singh, Rajeshwar
    Chakraborty, Chinmay
    Maakar, Sunil Kr.
    Makkar, Aaisha
    Sinwar, Deepak
    MICROPROCESSORS AND MICROSYSTEMS, 2024, 105
  • [39] Cyber Attacks Classification in IoT-based-Healthcare Infrastructure
    Djenna, Amir
    Saidouni, Djamel Eddine
    2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [40] Visualizing cyber attacks using IP matrix
    Koike, H
    Ohno, K
    Koizumi, K
    IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, 2005, : 91 - 98