2019 IEEE Conference on Communications and Network Security (CNS) 2019
DOI: 10.1109/cns.2019.8802639
|View full text |Cite
|
Sign up to set email alerts
|

CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 22 publications
0
4
0
3
Order By: Relevance
“…Therefore, a more appropriate way to determine the risks for ICS is a method that is based on the preparation of attack profiles [3][4]. With this method, attack profiles are considered as sequences of attacks that consist of a combination of different threats [1][2][3][4]. Then the number of risks can be described by the following dependence:…”
Section: Methods and Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, a more appropriate way to determine the risks for ICS is a method that is based on the preparation of attack profiles [3][4]. With this method, attack profiles are considered as sequences of attacks that consist of a combination of different threats [1][2][3][4]. Then the number of risks can be described by the following dependence:…”
Section: Methods and Modelsmentioning
confidence: 99%
“…As the number and complexity of successfully implemented cyberattacks on various information and communication systems (ICS) [1] - [2] grows, the need for qualitatively new procedures for forming the composition of information protection (IP) and cybersecurity (CS) complexes on all ICS protection circuits increases. Note that the permanent task of creating effective circuits for the ICS cybersecurity has generated a lot of researches on the optimization of the composition of information protection tools (IPT) and CS.…”
Section: Introductionmentioning
confidence: 99%
“…Аналіз останніх досліджень і публікацій. Збільшення кількості і складності успішно реалізованих кібератак на різні ОБІ [1,2] породжує потребу в якісно нових процедурах формування складу комплексів СЗІ та кібербезпеки (КБ) для всіх контурів захисту інформаційних масивів ОБІ. Задача, що не втрачає актуальність формування ефективних контурів захисту інформації (ЗІ) та КБ ОБІ породила безліч теоретичних і прикладних досліджень, присвячених питанням оптимізації складу СЗІ та КБ [3,4].…”
Section: постановка проблемиunclassified
“…Probably the best-known tools were proposed by MITRE [92], such as CyGraph [73]. Applied research and experimental deployment are becoming subject of research by other research groups as well [48,54,56,78,80].…”
Section: Publications On Csamentioning
confidence: 99%
“…Network security situation forecasting [63] covers various approaches to forecast holistic cybersecurity situation, such as an increase or decrease in the number of expected attacks. The last two categories often rely on time series analysis and other statistical inferences but may also involve predictions based on unconventional sources, such as recent news or sentiment on social media [80].…”
Section: Taxonomy and Components Of Csamentioning
confidence: 99%