Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery
File(s)paper8.pdf (530.64 KB)
Accepted version
OA Location
Author(s)
Type
Conference Paper
Abstract
Over the last years, computer networks have evolved into
highly dynamic and interconnected environments, involving multiple heterogeneous
devices and providing a myriad of services on top of them.
This complex landscape has made it extremely difficult for security administrators
to keep accurate and be effective in protecting their systems
against cyber threats. In this paper, we describe our vision and scientific
posture on how artificial intelligence techniques and a smart use of security
knowledge may assist system administrators in better defending
their networks. To that end, we put forward a research roadmap involving
three complimentary axes, namely, (I) the use of FCA-based mechanisms
for managing configuration vulnerabilities, (II) the exploitation of
knowledge representation techniques for automated security reasoning,
and (III) the design of a cyber threat intelligence mechanism as a CKDD
process. Then, we describe a machine-assisted process for cyber threat
analysis which provides a holistic perspective of how these three research
axes are integrated together.
highly dynamic and interconnected environments, involving multiple heterogeneous
devices and providing a myriad of services on top of them.
This complex landscape has made it extremely difficult for security administrators
to keep accurate and be effective in protecting their systems
against cyber threats. In this paper, we describe our vision and scientific
posture on how artificial intelligence techniques and a smart use of security
knowledge may assist system administrators in better defending
their networks. To that end, we put forward a research roadmap involving
three complimentary axes, namely, (I) the use of FCA-based mechanisms
for managing configuration vulnerabilities, (II) the exploitation of
knowledge representation techniques for automated security reasoning,
and (III) the design of a cyber threat intelligence mechanism as a CKDD
process. Then, we describe a machine-assisted process for cyber threat
analysis which provides a holistic perspective of how these three research
axes are integrated together.
Date Issued
2015-07-25
Date Acceptance
2015-06-15
Citation
Proceedings of the 4th International Workshop "What can FCA do for Artificial Intelligence?", FCA4AI 2015, co-located with the International Joint Conference on Artificial Intelligence (IJCAI 2015), Buenos Aires, Argentina, July 25, 2015., 2015
Publisher
CEUR
Journal / Book Title
Proceedings of the 4th International Workshop "What can FCA do for Artificial Intelligence?", FCA4AI 2015, co-located with the International Joint Conference on Artificial Intelligence (IJCAI 2015), Buenos Aires, Argentina, July 25, 2015.
Copyright Statement
© 2015 The Authors
Identifier
http://www.imperial.ac.uk/people/m.barrere
Source
What can FCA do for Artificial Intelligence? (FCA4AI'15)
Publication Status
Published
Start Date
2015-07-25
Finish Date
2015-07-25
Coverage Spatial
Buenos Aires, Argentina