A genetic epidemiology approach to cyber-security

被引:0
|
作者
Santiago Gil
Alexander Kott
Albert-László Barabási
机构
[1] Center for Complex Network Research,Network Science Division
[2] Northeastern University,Department of Medicine
[3] Seed Scientific,undefined
[4] Army Research Laboratory,undefined
[5] Center for Cancer Systems Biology,undefined
[6] Dana-Farber Cancer Institute,undefined
[7] Brigham and Women's Hospital,undefined
[8] Harvard Medical School,undefined
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.
引用
收藏
相关论文
共 50 条
  • [1] A genetic epidemiology approach to cyber-security
    Gil, Santiago
    Kott, Alexander
    Barabasi, Albert-Laszlo
    SCIENTIFIC REPORTS, 2014, 4
  • [2] Scorecard Approach for Cyber-Security Awareness
    Shabe, Tsosane
    Kritzinger, Elmarie
    Loock, Marianne
    EMERGING TECHNOLOGIES FOR EDUCATION, 2018, 10676 : 144 - 153
  • [3] Cyber-Security: A Human-Centric Approach
    Liaropoulos, Andrew
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 189 - 194
  • [4] A supervisory control approach to dynamic cyber-security
    Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor
    MI, United States
    Lect. Notes Comput. Sci., (99-117):
  • [5] A Non-Militarised Approach to Cyber-Security
    Adams, Andrew
    Reich, Pauline
    Weinstein, Stuart
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 1 - 8
  • [6] A Supervisory Control Approach to Dynamic Cyber-Security
    Rasouli, Mohammad
    Miehling, Erik
    Teneketzis, Demosthenis
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 99 - 117
  • [7] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [8] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [9] Cyber-security threat
    Klebba, Jesse
    CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [10] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    ERCIM NEWS, 2015, (100): : 10 - 11