NERD: Neural Network for Edict of Risky Data Streams

07/08/2020
by   Sandro Passarelli, et al.
0

Cyber incidents can have a wide range of cause from a simple connection loss to an insistent attack. Once a potential cyber security incidents and system failures have been identified, deciding how to proceed is often complex. Especially, if the real cause is not directly in detail determinable. Therefore, we developed the concept of a Cyber Incident Handling Support System. The developed system is enriched with information by multiple sources such as intrusion detection systems and monitoring tools. It uses over twenty key attributes like sync-package ratio to identify potential security incidents and to classify the data into different priority categories. Afterwards, the system uses artificial intelligence to support the further decision-making process and to generate corresponding reports to brief the Board of Directors. Originating from this information, appropriate and detailed suggestions are made regarding the causes and troubleshooting measures. Feedback from users regarding the problem solutions are included into future decision-making by using labelled flow data as input for the learning process. The prototype shows that the decision making can be sustainably improved and the Cyber Incident Handling process becomes much more effective.

READ FULL TEXT

page 4

page 6

research
02/16/2023

Cyber-risk Perception and Prioritization for Decision-Making and Threat Intelligence

Cyber-risk assessment is gaining momentum due to the wide range of resea...
research
04/05/2022

Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System

The Internet is the most complex machine humankind has ever built, and h...
research
10/05/2009

Statistical Decision Making for Authentication and Intrusion Detection

User authentication and intrusion detection differ from standard classif...
research
08/09/2023

Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper

As cyber threats evolve and grow progressively more sophisticated, cyber...
research
06/26/2020

Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity

Computer users are generally faced with difficulties in making correct s...
research
04/01/2021

The best laid plans or lack thereof: Security decision-making of different stakeholder groups

Cyber security requirements are influenced by the priorities and decisio...
research
04/04/2019

GAN-based method for cyber-intrusion detection

Ubiquitous cyber-intrusions endanger the security of our devices constan...

Please sign up or login with your details

Forgot password? Click here to reset