2020
DOI: 10.3390/info11030168
|View full text |Cite
|
Sign up to set email alerts
|

Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects

Abstract: Early detection of the security incidents and correct forecasting of the attack development is the basis for the efficient and timely response to cyber threats. The development of the attack depends on future steps available to the attackers, their goals, and their motivation—that is, the attacker “profile” that defines the malefactor behaviour in the system. Usually, the “attacker profile” is a set of attacker’s attributes—both inner such as motives and skills, and external such as existing financial support … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 43 publications
0
8
0
Order By: Relevance
“…As a result, it is crucial for security systems to be up-to-date against scams, malware (malicious software), spam, and phishing attacks [3]. Although one solution can be focusing on detection [4] and classification [5] of the cyber attacks, it will not be sufficient enough considering the fact that these attacks happen globally [6]. There is an evident need for deeper understanding of cyber attacks in terms of spatial analysis [7].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, it is crucial for security systems to be up-to-date against scams, malware (malicious software), spam, and phishing attacks [3]. Although one solution can be focusing on detection [4] and classification [5] of the cyber attacks, it will not be sufficient enough considering the fact that these attacks happen globally [6]. There is an evident need for deeper understanding of cyber attacks in terms of spatial analysis [7].…”
Section: Introductionmentioning
confidence: 99%
“…However, the motivation of these attackers is usually presented in relation to the automation level of mines, goal/business impact, mode of attack, and attackers’ profile/model (e.g., hacktivists, competitors, cybercriminal syndicates, employees, terrorists). The attackers’ profile/model, in turn, also depends on the attackers’ skills/knowledge or location (see [ 55 ]). In another work [ 56 ], the cyber attackers are characterized by taking into account, among others, their motivation, technique used, or types of targets.…”
Section: Fuzzy-based Risk Analysis Methodsmentioning
confidence: 99%
“…We analyzed a set of studies to understand what approaches exist in the area. Based on the conducted analysis, we outlined four main groups of techniques for attacker specification and modelling in risk analysis tasks [ 17 ]: attack graph analysis; hidden Markov model; fuzzy inference; attributing cyber attacks using data mining techniques including neural networks, statistics, etc. …”
Section: Related Workmentioning
confidence: 99%
“…In [ 17 ], the authors analyzed existing models of both classes and their application for risk analysis tasks. This paper extends the obtained results and presents them in the form of a taxonomy of the attacker model attributes that considers risk analysis techniques that use attacker models.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation