2021
DOI: 10.1007/978-3-030-68734-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Methodology for Specialized Behavior Analysis

Abstract: Analyzing attacker behavior and generating realistic models to accurately capture the realities of cybersecurity threats is a very challenging task for researchers. Psychological personality and profiling studies provide a broad understanding of personality traits, but lack a level of interactive immersion that enables observers to collect concrete cybersecurity-relevant behavioral data. Participant's intricate actions and interactions with real computer systems are seldom captured in any cybersecurity studies… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 16 publications
0
1
0
Order By: Relevance
“…Cloud computing has the adaptability of resource allocation [13]. Resource allocation is a technique that distributes the available resources in a cloud data center among users.…”
Section: Adaptive Threat Intelligencementioning
confidence: 99%
See 1 more Smart Citation
“…Cloud computing has the adaptability of resource allocation [13]. Resource allocation is a technique that distributes the available resources in a cloud data center among users.…”
Section: Adaptive Threat Intelligencementioning
confidence: 99%
“…By continuously monitoring network traffic, it captures and establishes a baseline of regular activity and interactions and has identified a reference point for subsequent network activity. (Padilla et al, 2021) When activity deviates from this established standard, it immediately issues an alert. By recognizing these deviations in real-time, the system ensures that potential threats are identified and dealt with promptly, in terms of detecting threats that may not necessarily be overtly malicious but may have subtle patterns of anomalies.…”
Section: Behavioral Analyticsmentioning
confidence: 99%
“…A possible solution to the problems above is remote experimentation. Such experiments might be conducted at scale and enrich the cyber security community with larger, more comprehensive datasets that are currently lacking [15]. ensures true representation and inclusivity in terms of participants and experimental environment, while control enables researchers to isolate variables and components being studied [5].…”
mentioning
confidence: 99%