Skip to main content
Top
Published in: Wirtschaftsinformatik & Management 3/2022

07-04-2022 | Spektrum

Identifikation der Urheber von Cyberattacken mithilfe künstlicher Intelligenz

Bedrohungen durch Cyberangriffe

Authors: Prof. Dr. Marco Barenkamp, Ing. Marcus Krüger

Published in: Wirtschaftsinformatik & Management | Issue 3/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Auszug

Unter einem Cyberangriff versteht man einen unerwünschten Versuch, durch unbefugten Zugriff auf Computersysteme des Angegriffenen Informationen zu stehlen, preiszugeben, zu verändern, zu deaktivieren oder auch zu löschen. …

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Morovat, K., & Panda, B. (2020). Survey of artificial intelligence in cybersecurity. 2020 International Conference on Computational Science and Computational Intelligence. (S. 109–115). Morovat, K., & Panda, B. (2020). Survey of artificial intelligence in cybersecurity. 2020 International Conference on Computational Science and Computational Intelligence. (S. 109–115).
2.
go back to reference Wiafe, I., Koranteng, F. N., Obeng, E. N., Assyne, N., Wiafe, A., & Guilliver, S. R. (2020). Artificial intelligence for cybersecurity: a systematic mapping of literature. IEEE Access, 8, 146.598–146.612.CrossRef Wiafe, I., Koranteng, F. N., Obeng, E. N., Assyne, N., Wiafe, A., & Guilliver, S. R. (2020). Artificial intelligence for cybersecurity: a systematic mapping of literature. IEEE Access, 8, 146.598–146.612.CrossRef
3.
go back to reference Rege, M., & Mbah, R. B. K. (2018). Machine learning for cyber defense and attack. The Seventh International Conference on Data Analytics. (S. 73–78). Rege, M., & Mbah, R. B. K. (2018). Machine learning for cyber defense and attack. The Seventh International Conference on Data Analytics. (S. 73–78).
5.
go back to reference Ulrich, P., Frank, V., & Timmermann, A. (2020). Cybercrime im Mittelstand. Studienserie „Erfolgsfaktoren der Unternehmensführung“. Bd. 5. Aalen: Hochschule Aalen. Ulrich, P., Frank, V., & Timmermann, A. (2020). Cybercrime im Mittelstand. Studienserie „Erfolgsfaktoren der Unternehmensführung“. Bd. 5. Aalen: Hochschule Aalen.
6.
go back to reference Saalbach, K.-K. (2019). Attribution of cyber attacks. Information technology for peace and security (S. 279–303). Wiesbaden: Springer.CrossRef Saalbach, K.-K. (2019). Attribution of cyber attacks. Information technology for peace and security (S. 279–303). Wiesbaden: Springer.CrossRef
7.
go back to reference Parrend, P., Navarro, J., Guigou, F., Deruyver, A., & Collet, P. (2018). Foundations and applications of artificial intelligence for zero-day and multi-step attack detection. Journal on Information Security, 201(4), 1–21. Parrend, P., Navarro, J., Guigou, F., Deruyver, A., & Collet, P. (2018). Foundations and applications of artificial intelligence for zero-day and multi-step attack detection. Journal on Information Security, 201(4), 1–21.
12.
go back to reference Pupillo, L., Fantin, S., Ferreira, A., & Polito, C. (2021). Artificial intelligence and cybersecurity—technology, governance, and policy challenges. Bruessels: Centre for European Policy Studies. Pupillo, L., Fantin, S., Ferreira, A., & Polito, C. (2021). Artificial intelligence and cybersecurity—technology, governance, and policy challenges. Bruessels: Centre for European Policy Studies.
13.
go back to reference Mathew, A. (2021). Artificial intelligence for offence and defense—the future of cybersecurity. International Journal of Multidisciplinary and Current Educational Research, 3(3), 159–163. Mathew, A. (2021). Artificial intelligence for offence and defense—the future of cybersecurity. International Journal of Multidisciplinary and Current Educational Research, 3(3), 159–163.
14.
go back to reference Tao, F., Akhtar, M. S., & Jiayuan, Z. (2021). The future of artificial intelligence in cybersecurity: a comprehensive survey. EAI Endorsed Transactions on Creative Technologies, 8(28), 1–15.CrossRef Tao, F., Akhtar, M. S., & Jiayuan, Z. (2021). The future of artificial intelligence in cybersecurity: a comprehensive survey. EAI Endorsed Transactions on Creative Technologies, 8(28), 1–15.CrossRef
15.
go back to reference Hebbar, A., & Kumar, S. A. (2021). Artificial intelligence in cyber security. Journal of Emerging Technologies and Innovative Research, 8(5), 448–452. Hebbar, A., & Kumar, S. A. (2021). Artificial intelligence in cyber security. Journal of Emerging Technologies and Innovative Research, 8(5), 448–452.
16.
go back to reference Apruzzese, A., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. (2018). The effectiveness of machine and deep learning for cyber security. 10th International Conference on Cyber Conflict. (S. 371–390). Apruzzese, A., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. (2018). The effectiveness of machine and deep learning for cyber security. 10th International Conference on Cyber Conflict. (S. 371–390).
17.
go back to reference Musser, A., & Garriott, A. (2021). Machine learning and cybersecurity—reality and hype. : Center for Security and Emerging Technology.CrossRef Musser, A., & Garriott, A. (2021). Machine learning and cybersecurity—reality and hype. : Center for Security and Emerging Technology.CrossRef
18.
go back to reference Noor, U., Amjad, T., Anwar, Z., & Choo, K.-K. R. (2019). A machine learning-based fintech cyber threat attribution framework using high-level indicators of compromise. Future Generation Computer Systems, 96(1), 227–242.CrossRef Noor, U., Amjad, T., Anwar, Z., & Choo, K.-K. R. (2019). A machine learning-based fintech cyber threat attribution framework using high-level indicators of compromise. Future Generation Computer Systems, 96(1), 227–242.CrossRef
21.
go back to reference Qian, C., He, T., & Zhang, R. (2017). Deep learning based authorship identification. : Stanford University. Qian, C., He, T., & Zhang, R. (2017). Deep learning based authorship identification. : Stanford University.
22.
go back to reference Preuveneers, D., & Joosen, W. (2021). Sharing machine learning models as indicators of compromise for cyber threat intelligence. Journal of Cybersecurity and Privacy, 1, 140–163.CrossRef Preuveneers, D., & Joosen, W. (2021). Sharing machine learning models as indicators of compromise for cyber threat intelligence. Journal of Cybersecurity and Privacy, 1, 140–163.CrossRef
Metadata
Title
Identifikation der Urheber von Cyberattacken mithilfe künstlicher Intelligenz
Bedrohungen durch Cyberangriffe
Authors
Prof. Dr. Marco Barenkamp
Ing. Marcus Krüger
Publication date
07-04-2022
Publisher
Springer Fachmedien Wiesbaden
Published in
Wirtschaftsinformatik & Management / Issue 3/2022
Print ISSN: 1867-5905
Electronic ISSN: 1867-5913
DOI
https://doi.org/10.1365/s35764-022-00401-x

Other articles of this Issue 3/2022

Wirtschaftsinformatik & Management 3/2022 Go to the issue

Premium Partner