Skip to main content

Improving Cyber Situational Awareness Through Data Mining and Predictive Analytic Techniques

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 534))

Abstract

Due to the widespread usage of computer resources in everyday life, cyber security has been highlighted as one of the main concerns of governments and authorities. Data mining technology can be used for prevention of cyber breaches in different ways and Cyber Situational Awareness (CSA) can be improved based on analyzing past experiences in terms of cyber-attacks. This paper aims to investigate and review current state of CSA improvement through data mining techniques and predictive analytic and offers possible methodology based on data mining techniques which can be used by cyber firms in order to secure themselves against future cyber threats.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Aaviksoo, J.: Cyber-terrorism. Vital Speeches Day 74(1), 28 (2008)

    Google Scholar 

  • Ahlemeyer-Stubbe, A., Coleman, S.: A Practical Guide to Data Mining for Business and Industry. Wiley, New York (2014)

    Book  Google Scholar 

  • Ahn, S., Kim, N., Chung, T.: Big Data Analysis System Concept for Detecting Unknown Attacks (2014)

    Google Scholar 

  • Al-janabi, K.B.S.: A proposed framework for analyzing crime data set using decision tree and simple k-means mining algorithms. J. Kufa Math. Comput. 1(3), 8–24 (2011)

    Google Scholar 

  • Antonik, J.: Decision management. In: Military Communications Conference (MILCOM 2007), Orlando, FL, USA, October 2007, pp. 1–5. IEEE (2007)

    Google Scholar 

  • Aspan, M., Soh, K.: Citi says 360,000 accounts hacked in May cyber attack. Reuters (2011)

    Google Scholar 

  • Awan, I., Blakemore, B.: Policing Cyber Hate, Cyber Threats and Cyber Terrorism. Ashgate, Farnham (2012). MyiLibrary

    Google Scholar 

  • Barford, P., Dacier, M., Dietterich, T.G., Fredrikson, M., Giffin, J., Jajodia, S., et al.: Cyber SA: situational awareness for cyber defense. In: Jajodia, S., Liu, P., Swarup, V., Wang, C. (eds.) Cyber Situational Awareness, pp. 3–14. Springer, New York (2010)

    Chapter  Google Scholar 

  • Bhardwaj, B.K., Pal, S.: Data Mining: a prediction for performance improvement using classification. Int. J. Comput. Sci. Inf. Secur. 9(4), 136–140 (2011)

    Google Scholar 

  • Cox, C.: Cyber capabilities and intent of terrorist forces. Inf. Secur. J. Global Perspect. 24, 1–8 (2015)

    Article  Google Scholar 

  • Das, S., Mukhopadhyay, A., Shukla, G.K.: i-HOPE framework for predicting cyber breaches: a logit approach. In: 2013 46th Hawaii International Conference on System Sciences, pp. 3008–3017 (2013)

    Google Scholar 

  • Dean, J.: Big Data, Data Mining, and Machine Learning: Value Creation for Business Leaders and Practitioners. Wiley and SAS Business Series. Wiley, Hoboken (2014)

    Book  Google Scholar 

  • Dua, S., Du, X.: Data Mining and Machine Learning in Cybersecurity. CRC Press, Boca Raton (2011)

    Book  MATH  Google Scholar 

  • Dutt, V., Ahn, Y.-S., Gonzalez, C.: Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory. Hum. Factors J. Hum. Factors Ergon. Soc. 55(3), 605–618 (2012). doi:10.1177/0018720812464045

    Article  Google Scholar 

  • Fayyad, S., Meinel, C.: Attack scenario prediction methodology. In: 2013 10th International Conference on Information Technology: New Generations, pp. 53–59 (2013). doi:10.1109/ITNG.2013.16

  • Franke, U., Brynielsson, J.: Cyber situational awareness – a systematic review of the literature. Comput. Secur. 46, 18–31 (2014). doi:10.1016/j.cose.2014.06.008

    Article  Google Scholar 

  • Harrison, L., Laska, J., Spahn, R., Iannacone, M., Downing, E., Ferragut, E.M., Goodall, J.R.: situ: situational understanding and discovery for cyber attacks. In: 2012 IEEE Conference on Visual Analytics Science and Technology (VAST), pp. 307–308 (2012). doi:10.1109/VAST.2012.6400503

  • Jaishankar, K.: Cyber Criminology: Exploring Internet Crimes and Criminal Behavior. CRC, Boca Raton, London (2011). Dawsonera

    Book  Google Scholar 

  • Ledolter, J.: Data Mining and Business Analytics with R. Wiley and SAS Business Series. Wiley, Hoboken (2013)

    Book  MATH  Google Scholar 

  • Lewis, J.A.: Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats, 1–12 December 2002

    Google Scholar 

  • Morris, I., Mayron, L.M., Smith, W.B., Knepper, M.M., Ita, R., Fox, K.L., Corp, H.: A perceptually-relevant model-based cyber threat prediction method for enterprise mission assurance, pp. 60–65 (2011)

    Google Scholar 

  • Musliner, D.J., Rye, J.M., Thomsen, D., McDonald, D.D., Burstein, M.H., Robertson, P.: FUZZBUSTER: towards adaptive immunity from cyber threats. In: 2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops, pp. 137–140 (2011). doi:10.1109/SASOW.2011.26

  • Nikishin, A.: Malicious software–past, present and future. Inf. Secur. Tech. Rep. 9(2), 6–18 (2004)

    Article  Google Scholar 

  • Odei Danso, S.: An exploration of classification prediction techniques in data mining: the insurance domain. Master Degree Thesis, Bournmouth University (2006)

    Google Scholar 

  • Pollitt, M.M.: “Cyberterrorism — fact or fancy?”. Comput. Fraud Secur. 1998(2), 8–10 (1998)

    Article  Google Scholar 

  • Savov, V.: Sony Pictures hacked: the full story (WWW Document). The Verge (2014). http://www.theverge.com/2014/12/8/7352581/sony-pictures-hacked-storystream. Accessed 6 April 15

  • Schreiber-Ehle, S., Koch, W.: The JDL model of data fusion applied to cyber-defence—a review paper. In: 2012 Workshop on Sensor Data Fusion: Trends, Solutions, Applications (SDF), 4–6 September 2012 (2012). doi:10.1109/SDF.2012.6327919

  • Wu, J., Yin, L., Guo, Y.: Cyber attacks prediction model based on Bayesian network. In: 2012 IEEE 18th International Conference on Parallel and Distributed Systems, pp. 730–731 (2012). doi:10.1109/ICPADS.2012.117

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sina Pournouri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Pournouri, S., Akhgar, B. (2015). Improving Cyber Situational Awareness Through Data Mining and Predictive Analytic Techniques. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23276-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23275-1

  • Online ISBN: 978-3-319-23276-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics