2019 15th International Conference on Network and Service Management (CNSM) 2019
DOI: 10.23919/cnsm46954.2019.9012686
|View full text |Cite
|
Sign up to set email alerts
|

MENTOR: The Design and Evaluation of a Protection Services Recommender System

Abstract: Cyberattacks are the cause of several damages on governments and companies in the last years. Such damage includes not only leaks of sensitive information, but also economic loss due to downtime of services. The security market size worth billions of dollars, which represents investments to acquire protection services and training response teams to operate such services, determines a considerable part of the investment in technologies around the world. Although a vast number of protection services are availabl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…In their paper, Franco et al [ 92 ] (as well as [ 40 ]) have presented the MENTOR system, which they describe as a “support tool for cybersecurity”. It was designed to be able to recommend the most suitable protection measures (such as specific anti-malware tools, firewalls, etc.…”
Section: The Results Of the Study—the State Of The Art Of Recommender Systems For Cybersecuritymentioning
confidence: 99%
“…In their paper, Franco et al [ 92 ] (as well as [ 40 ]) have presented the MENTOR system, which they describe as a “support tool for cybersecurity”. It was designed to be able to recommend the most suitable protection measures (such as specific anti-malware tools, firewalls, etc.…”
Section: The Results Of the Study—the State Of The Art Of Recommender Systems For Cybersecuritymentioning
confidence: 99%
“…In such a model it will be possible for members to create strategic regional alliances and use a portion of their infrastructure to perform mitigation services. Therefore, in combination with recommender services [57] as selection of a suitable protection provider based on specified requirements can optimize costs.…”
Section: Discussion Of Achievementsmentioning
confidence: 99%
“…The Data Layer and the User Layer communicate through the Communication API. An Integration API allows for external solutions to request information and reuse available miners, which provides integration options, such as for systems to recommend or offer protections against cyberattacks [9], [10].…”
Section: The Secgrid Platformmentioning
confidence: 99%