2021 International Conference on Computing, Computational Modelling and Applications (ICCMA) 2021
DOI: 10.1109/iccma53594.2021.00020
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threat Ontology and Adversarial Machine Learning Attacks: Analysis and Prediction Perturbance

Abstract: Machine learning has been used in the cybersecurity domain to predict cyberattack trends. However, adversaries can inject malicious data into the dataset during training and testing to cause perturbance and predict false narratives. It has become challenging to analyse and predicate cyberattack correlations due to their fuzzy nature and lack of understanding of the threat landscape. Thus, it is imperative to use cyber threat ontology (CTO) concepts to extract relevant attack instances in CSC security for knowl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…Cyber threat ontology (CTO) from a security perspective describes organizational security concepts, properties relationships, and interdependencies in a formal and structured approach for analysis and intelligence gatherings [24]. The goal of CTO considers the extraction of relevant attack instances and threat information from data to ensure consistency and accuracy in the cybersecurity concepts for knowledge reuse in the threat intelligence domain [24]. The work of Ulicny et al [25] is considered among the first in this field and has taken an important step forward.…”
Section: Threat Ontology Constructionmentioning
confidence: 99%
“…Cyber threat ontology (CTO) from a security perspective describes organizational security concepts, properties relationships, and interdependencies in a formal and structured approach for analysis and intelligence gatherings [24]. The goal of CTO considers the extraction of relevant attack instances and threat information from data to ensure consistency and accuracy in the cybersecurity concepts for knowledge reuse in the threat intelligence domain [24]. The work of Ulicny et al [25] is considered among the first in this field and has taken an important step forward.…”
Section: Threat Ontology Constructionmentioning
confidence: 99%