2019
DOI: 10.1109/comst.2018.2885561
|View full text |Cite
|
Sign up to set email alerts
|

Data-Driven Cybersecurity Incident Prediction: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
116
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 264 publications
(136 citation statements)
references
References 63 publications
0
116
0
Order By: Relevance
“…Statistical methods have been widely used in the context of data-driven cyber security research, such as intrusion detection [15][16][17][18]. However, deep learning has not received the due amount of attention in the context of cyber security [13,14]. This is true despite the fact that deep learning has been tremendous successful in other application domains [19][20][21] and has started to be employed in the cyber security domains, including adversarial malware detection [22,23] and vulnerability detection [24,25].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Statistical methods have been widely used in the context of data-driven cyber security research, such as intrusion detection [15][16][17][18]. However, deep learning has not received the due amount of attention in the context of cyber security [13,14]. This is true despite the fact that deep learning has been tremendous successful in other application domains [19][20][21] and has started to be employed in the cyber security domains, including adversarial malware detection [22,23] and vulnerability detection [24,25].…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, researchers have studied how to use a Bayesian method to predict the increase or decrease of cyber attacks [6], how to use a hidden Markov model to predict the increase or decrease of Bot agents [7], how to use a seasonal ARIMA *Correspondence: xfang13@ilstu.edu 1 School of Information Technology, Illinois State University, Normal 61761, IL, USA Full list of author information is available at the end of the article model to predict cyber attacks [8], how to use a FARIMA model to predict cyber attack rates when the time series data exhibits long-range dependence [1], how to use a FARIMA+GARCH model to achieve even more accurate predictions by further accommodating the extreme values exhibited by the time series data [9], how to use a marked point process to model extreme cyber attack rates while considering both magnitudes and inter-arrival times of time series [10], how to use a vine copula model to quantify the effectiveness of cyber defense early-warning mechanisms [11], and how to use a vine copula model to predict multivariate time series of cybersecurity attacks while accommodating the high-dimensional dependence between the time series [12]. We refer to two recent surveys on the use of statistical methods in cyber incident and attack detection and prediction [13,14].…”
Section: Introductionmentioning
confidence: 99%
“…[30][31][32] In this category, there are also many studies trying to solve specific problems like "Twitter Spam Drift" [33][34][35] for data-driven cybersecurity prediction tasks. 36 On the other hand, content-based approaches make use of the properties of a posted tweet that includes the count of mentions, count of hashtags, links, trending topics, and duplicate tweets. [37][38][39] Hybrid methods uses the features of both user-based and content-based methods.…”
Section: Related Workmentioning
confidence: 99%
“…Cybersecurity has become a very hot topic in recent years. Many communities, groups, and governments start to realize the importance and urgency to deal with the ever‐changing cyberattacks . Experts in the industry and scholars in the academia strive to innovate the next‐generation solutions.…”
Section: Introductionmentioning
confidence: 99%
“…Experts in the industry and scholars in the academia strive to innovate the next‐generation solutions. Among the technical solutions, machine learning–based methods receive an increasingly popular favor due to its superior efficiency comparing with manual analysis . In addition, the instantaneous protection brought by the machine learning–based solutions surpasses most reactive technologies including the automated protection systems in terms of reaction time.…”
Section: Introductionmentioning
confidence: 99%