Skip to main content
main-content
Top

Hint

Swipe to navigate through the chapters of this book

2016 | OriginalPaper | Chapter

Cyber Attacks Analysis Using Decision Tree Technique for Improving Cyber Situational Awareness

Authors: Sina Pournouri, Babak Akhgar, Petra Saskia Bayerl

Published in: Global Security, Safety and Sustainability - The Security Challenges of the Connected World

Publisher: Springer International Publishing

share
SHARE

Abstract

Cyber Security experts are trying to find solutions to prevent cyber-attacks and one of the main solutions is improving cyber situational awareness which leads to an extensive overview of the current situation in cyber space and gives prediction ability to managers to prevent future cyber threats. In this paper we aim to improve cyber situational awareness by analysing past cyber incidents in 2015 and for this purpose Open Source Intelligence has been chosen as main source of initial dataset and also Decision tree method has been used as a classification technique and a predictive approach in order to analyse the data.

To get access to this content you need the following product:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Testen Sie jetzt 15 Tage kostenlos.

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




Testen Sie jetzt 15 Tage kostenlos.

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Testen Sie jetzt 15 Tage kostenlos.

Literature
go back to reference Ahn, S.H., Kim, N.U., Chung, T.M.: Big data analysis system concept for detecting unknown attacks. In: 16th International Conference on Advanced Communication Technology, pp. 269–272. IEEE, February 2014 Ahn, S.H., Kim, N.U., Chung, T.M.: Big data analysis system concept for detecting unknown attacks. In: 16th International Conference on Advanced Communication Technology, pp. 269–272. IEEE, February 2014
go back to reference Barford, P., Dacier, M., Dietterich, T.G., Fredrikson, M., Giffin, J., Jajodia, S., Wang, C.: Cyber SA: Situational Awareness for Cyber Defense, pp. 3–14 (2010) Barford, P., Dacier, M., Dietterich, T.G., Fredrikson, M., Giffin, J., Jajodia, S., Wang, C.: Cyber SA: Situational Awareness for Cyber Defense, pp. 3–14 (2010)
go back to reference Bhardwaj, V., Johari, R.: Big data analysis: issues and challenges. In: 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), pp. 1–6. IEEE, January 2015 Bhardwaj, V., Johari, R.: Big data analysis: issues and challenges. In: 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), pp. 1–6. IEEE, January 2015
go back to reference Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderson, R.: Chip and Skim: cloning EMV cards with the pre-play attack. In: 2014 IEEE Symposium on Security and Privacy, pp. 49–64. IEEE, May 2014 Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderson, R.: Chip and Skim: cloning EMV cards with the pre-play attack. In: 2014 IEEE Symposium on Security and Privacy, pp. 49–64. IEEE, May 2014
go back to reference Das, S., Mukhopadhyay, A., Shukla, G.K.: i-HOPE framework for predicting cyber breaches: a logit approach. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 3008–3017. IEEE, January 2013 Das, S., Mukhopadhyay, A., Shukla, G.K.: i-HOPE framework for predicting cyber breaches: a logit approach. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 3008–3017. IEEE, January 2013
go back to reference Dutt, V., Ahn, Y.S., Gonzalez, C.: Cyber situation awareness modeling detection of cyber attacks with instance-based learning theory. Hum. Factors J. Hum. Factors Ergon. Soc. 55(3), 605–618 (2013) CrossRef Dutt, V., Ahn, Y.S., Gonzalez, C.: Cyber situation awareness modeling detection of cyber attacks with instance-based learning theory. Hum. Factors J. Hum. Factors Ergon. Soc. 55(3), 605–618 (2013) CrossRef
go back to reference EMC Education Services, Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data. John Wiley & Sons (2015) EMC Education Services, Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data. John Wiley & Sons (2015)
go back to reference Endler, D.: The evolution of cross site scripting attacks. Technical report, iDEFENSE Labs (2002) Endler, D.: The evolution of cross site scripting attacks. Technical report, iDEFENSE Labs (2002)
go back to reference Estrada, E.: Network robustness to targeted attacks. The interplay of expansibility and degree distribution. Eur. Phys. J. B 52(4), 563–574 (2006) CrossRefMATH Estrada, E.: Network robustness to targeted attacks. The interplay of expansibility and degree distribution. Eur. Phys. J. B 52(4), 563–574 (2006) CrossRefMATH
go back to reference Fayyad, S., Meinel, C.: Attack scenario prediction methodology. In: 2013 Tenth International Conference on Information Technology: New Generations (ITNG), pp. 53–59. IEEE, April 2013 Fayyad, S., Meinel, C.: Attack scenario prediction methodology. In: 2013 Tenth International Conference on Information Technology: New Generations (ITNG), pp. 53–59. IEEE, April 2013
go back to reference Feasel, J., Romas, G.: Visualization, Modeling and Predictive Analysis of Internet Attacks, vol. 8768, pp. 1–6 (2013) Feasel, J., Romas, G.: Visualization, Modeling and Predictive Analysis of Internet Attacks, vol. 8768, pp. 1–6 (2013)
go back to reference Gordon, S., Ford, R.: On the definition and classification of cybercrime. J. Comput. Virol. 2(1), 13–20 (2006) CrossRef Gordon, S., Ford, R.: On the definition and classification of cybercrime. J. Comput. Virol. 2(1), 13–20 (2006) CrossRef
go back to reference Grossman, J.: XSS Attacks: Cross-site scripting exploits and defense. Syngress (2007) Grossman, J.: XSS Attacks: Cross-site scripting exploits and defense. Syngress (2007)
go back to reference Himma, K.E.: Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? SSRN 799545 (2005) Himma, K.E.: Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? SSRN 799545 (2005)
go back to reference Householder, A., Houle, K., Dougherty, C.: Computer attack trends challenge Internet security. Computer 35(4), 5–7 (2002) CrossRef Householder, A., Houle, K., Dougherty, C.: Computer attack trends challenge Internet security. Computer 35(4), 5–7 (2002) CrossRef
go back to reference Jackson, C., Barth, A., Bortz, A., Shao, W., Boneh, D.: Protecting browsers from DNS rebinding attacks. ACM Trans. Web (TWEB) 3(1), 2 (2009) Jackson, C., Barth, A., Bortz, A., Shao, W., Boneh, D.: Protecting browsers from DNS rebinding attacks. ACM Trans. Web (TWEB) 3(1), 2 (2009)
go back to reference Kumar, V., Srivastava, J., Lazarevic, A. (eds.): Managing Cyber Threats: Issues, Approaches, and Challenges, vol. 5. Springer Science & Business Media, Heidelberg (2006) Kumar, V., Srivastava, J., Lazarevic, A. (eds.): Managing Cyber Threats: Issues, Approaches, and Challenges, vol. 5. Springer Science & Business Media, Heidelberg (2006)
go back to reference Lewis, J.A.: Assessing the Risks of Cyber Terrorism, Cyber War and other Cyber Threats. Center for Strategic & International Studies, Washington, DC (2002) Lewis, J.A.: Assessing the Risks of Cyber Terrorism, Cyber War and other Cyber Threats. Center for Strategic & International Studies, Washington, DC (2002)
go back to reference Minelli, M., Chambers, M., Dhiraj, A.: Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today’s Businesses. John Wiley & Sons, New York (2012) Minelli, M., Chambers, M., Dhiraj, A.: Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today’s Businesses. John Wiley & Sons, New York (2012)
go back to reference Morris, T.I., Mayron, L.M., Smith, W.B., Knepper, M.M., Ita, R., Fox, K.L.: A perceptually-relevant model-based cyber threat prediction method for enterprise mission assurance. In: 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 60–65. IEEE, February 2011 Morris, T.I., Mayron, L.M., Smith, W.B., Knepper, M.M., Ita, R., Fox, K.L.: A perceptually-relevant model-based cyber threat prediction method for enterprise mission assurance. In: 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 60–65. IEEE, February 2011
go back to reference Musliner, D.J., Rye, J.M., Thomsen, D., McDonald, D.D., Burstein, M.H., Robertson, P.: Fuzzbuster: towards adaptive immunity from cyber threats. In: 2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW), pp. 137–140. IEEE, October 2011 Musliner, D.J., Rye, J.M., Thomsen, D., McDonald, D.D., Burstein, M.H., Robertson, P.: Fuzzbuster: towards adaptive immunity from cyber threats. In: 2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW), pp. 137–140. IEEE, October 2011
go back to reference O’Hara, G.: Cyber-Espionage: a Growing threat to the american economy. CommLaw Conspectus 19, 241 (2010) MathSciNet O’Hara, G.: Cyber-Espionage: a Growing threat to the american economy. CommLaw Conspectus 19, 241 (2010) MathSciNet
go back to reference Pournouri, S., Craven, M.: E-business, recent threats and security countermeasures. Int. J. Electron. Secur. Digit. Forensics 6(3), 169–184 (2014) CrossRef Pournouri, S., Craven, M.: E-business, recent threats and security countermeasures. Int. J. Electron. Secur. Digit. Forensics 6(3), 169–184 (2014) CrossRef
go back to reference Schreiber-Ehle, S., Koch, W.: The JDL model of data fusion applied to cyber-defence—a review paper. In: 2012 Workshop on Sensor Data Fusion: Trends, Solutions, Applications (SDF), pp. 116–119. IEEE, September 2012 Schreiber-Ehle, S., Koch, W.: The JDL model of data fusion applied to cyber-defence—a review paper. In: 2012 Workshop on Sensor Data Fusion: Trends, Solutions, Applications (SDF), pp. 116–119. IEEE, September 2012
go back to reference Steele, R.: Open source intelligence. In: Handbook of Intelligence Studies, pp. 129–147 (2007) Steele, R.: Open source intelligence. In: Handbook of Intelligence Studies, pp. 129–147 (2007)
go back to reference Verborgh, R., De Wilde, M.: Using OpenRefine. Packt Publishing Ltd. (2013) Verborgh, R., De Wilde, M.: Using OpenRefine. Packt Publishing Ltd. (2013)
go back to reference Wu, J., Yin, L., Guo, Y.: Cyber attacks prediction model based on Bayesian network. In: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS), pp. 730–731. IEEE, December 2012 Wu, J., Yin, L., Guo, Y.: Cyber attacks prediction model based on Bayesian network. In: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS), pp. 730–731. IEEE, December 2012
go back to reference Yaar, A., Perrig, A., Song, D.: Pi: A path identification mechanism to defend against DDoS attacks. In: Proceedings of 2003 Symposium on Security and Privacy, pp. 93–107. IEEE, May 2003 Yaar, A., Perrig, A., Song, D.: Pi: A path identification mechanism to defend against DDoS attacks. In: Proceedings of 2003 Symposium on Security and Privacy, pp. 93–107. IEEE, May 2003
Metadata
Title
Cyber Attacks Analysis Using Decision Tree Technique for Improving Cyber Situational Awareness
Authors
Sina Pournouri
Babak Akhgar
Petra Saskia Bayerl
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-51064-4_14

Premium Partner