Proceedings of the 5th International Conference on Information Systems Security and Privacy 2019
DOI: 10.5220/0007309302300237
|View full text |Cite
|
Sign up to set email alerts
|

Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…A number of classification algorithms LR, DT, NB, and SVM are considered for cloud security and tested the models in diverse operational conditions using cloud security scenarios [20]. Further, [21] [31] predicted cybersecurity incidents by using Naive Bayes and SVM algorithms to investigate and analyse various datasets collected from SMEs. Finally, [32] model a risk teller system that used ML to predict which machines are at risk of getting infected or are clean and forecast if an organization may experience cybersecurity incidents in the future.…”
Section: Comparing Results With Existing Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A number of classification algorithms LR, DT, NB, and SVM are considered for cloud security and tested the models in diverse operational conditions using cloud security scenarios [20]. Further, [21] [31] predicted cybersecurity incidents by using Naive Bayes and SVM algorithms to investigate and analyse various datasets collected from SMEs. Finally, [32] model a risk teller system that used ML to predict which machines are at risk of getting infected or are clean and forecast if an organization may experience cybersecurity incidents in the future.…”
Section: Comparing Results With Existing Workmentioning
confidence: 99%
“…It includes unauthorized access or attempted to access a system or causing a disruptive event to essential services. Cybersecurity incident reporting platform provides individuals and organizations with a system to reports cyber incidents they have experienced unexpectedly or any unusual network issues, or suspected fraud or cybercrime activities [31]. Properties for cyber incident reporting include attack type, date and time of the incident, source of the attack, cause of an attack, duration, impact on service, impact on staff and public safety Cyber incident report system is required for cyber threat analysis and to determine the threat level and categorizing.…”
Section: A Csc Threat Modelling Conceptsmentioning
confidence: 99%
“…Mohasseb et al. (2019) used ML techniques and Naive Bayes and SVM algorithms on various datasets collected from SMEs for classification accuracies and predictive analytics on cyber security incidents (Mohasseb et al. , 2019).…”
Section: Related Workmentioning
confidence: 99%
“…The AUC-ROC distinguishes between probabilities and determines the right performance metrics to evaluate the algorithms. • Performance Evaluation: The performance of the models is evaluated based on the TP, TN, FP and FN values and the elements of the confusion matrix [19].…”
Section: Phase 2: Threat Predictionmentioning
confidence: 99%
“…Further, [4] proposed cybersecurity ontology framework for IoT and knowledge reasoning, [15] considered an ontology model that establishes relationships among networks, and [16] proposed a security ontology for capturing requirements. Furthermore, [17,18,19] used ML techniques on various algorithms to learn datasets for performance accuracies and predictions. All the works are relevant and contributes to cyber security improvement, however none of the works considered integrating CTI, ontology and ML to extract relevant attack instances for knowledge representation and threat predictions in CSC security domain.…”
Section: Comparison With Existing Workmentioning
confidence: 99%