Skip to main content

Cyber Attacks Analysis Using Decision Tree Technique for Improving Cyber Situational Awareness

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 630))

Abstract

Cyber Security experts are trying to find solutions to prevent cyber-attacks and one of the main solutions is improving cyber situational awareness which leads to an extensive overview of the current situation in cyber space and gives prediction ability to managers to prevent future cyber threats. In this paper we aim to improve cyber situational awareness by analysing past cyber incidents in 2015 and for this purpose Open Source Intelligence has been chosen as main source of initial dataset and also Decision tree method has been used as a classification technique and a predictive approach in order to analyse the data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Ahn, S.H., Kim, N.U., Chung, T.M.: Big data analysis system concept for detecting unknown attacks. In: 16th International Conference on Advanced Communication Technology, pp. 269–272. IEEE, February 2014

    Google Scholar 

  • Barford, P., Dacier, M., Dietterich, T.G., Fredrikson, M., Giffin, J., Jajodia, S., Wang, C.: Cyber SA: Situational Awareness for Cyber Defense, pp. 3–14 (2010)

    Google Scholar 

  • Bhardwaj, V., Johari, R.: Big data analysis: issues and challenges. In: 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), pp. 1–6. IEEE, January 2015

    Google Scholar 

  • Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderson, R.: Chip and Skim: cloning EMV cards with the pre-play attack. In: 2014 IEEE Symposium on Security and Privacy, pp. 49–64. IEEE, May 2014

    Google Scholar 

  • Boyd, S.W., Keromytis, A.D.: SQLrand: preventing SQL injection attacks. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 292–302. Springer Berlin Heidelberg, Berlin, Heidelberg (2004). doi:10.1007/978-3-540-24852-1_21

    Chapter  Google Scholar 

  • Das, S., Mukhopadhyay, A., Shukla, G.K.: i-HOPE framework for predicting cyber breaches: a logit approach. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 3008–3017. IEEE, January 2013

    Google Scholar 

  • Dutt, V., Ahn, Y.S., Gonzalez, C.: Cyber situation awareness modeling detection of cyber attacks with instance-based learning theory. Hum. Factors J. Hum. Factors Ergon. Soc. 55(3), 605–618 (2013)

    Article  Google Scholar 

  • EMC Education Services, Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data. John Wiley & Sons (2015)

    Google Scholar 

  • Endler, D.: The evolution of cross site scripting attacks. Technical report, iDEFENSE Labs (2002)

    Google Scholar 

  • Estrada, E.: Network robustness to targeted attacks. The interplay of expansibility and degree distribution. Eur. Phys. J. B 52(4), 563–574 (2006)

    Article  MATH  Google Scholar 

  • Fayyad, S., Meinel, C.: Attack scenario prediction methodology. In: 2013 Tenth International Conference on Information Technology: New Generations (ITNG), pp. 53–59. IEEE, April 2013

    Google Scholar 

  • Feasel, J., Romas, G.: Visualization, Modeling and Predictive Analysis of Internet Attacks, vol. 8768, pp. 1–6 (2013)

    Google Scholar 

  • Gordon, S., Ford, R.: On the definition and classification of cybercrime. J. Comput. Virol. 2(1), 13–20 (2006)

    Article  Google Scholar 

  • Grossman, J.: XSS Attacks: Cross-site scripting exploits and defense. Syngress (2007)

    Google Scholar 

  • Himma, K.E.: Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? SSRN 799545 (2005)

    Google Scholar 

  • Householder, A., Houle, K., Dougherty, C.: Computer attack trends challenge Internet security. Computer 35(4), 5–7 (2002)

    Article  Google Scholar 

  • Jackson, C., Barth, A., Bortz, A., Shao, W., Boneh, D.: Protecting browsers from DNS rebinding attacks. ACM Trans. Web (TWEB) 3(1), 2 (2009)

    Google Scholar 

  • Kumar, V., Srivastava, J., Lazarevic, A. (eds.): Managing Cyber Threats: Issues, Approaches, and Challenges, vol. 5. Springer Science & Business Media, Heidelberg (2006)

    Google Scholar 

  • Lewis, J.A.: Assessing the Risks of Cyber Terrorism, Cyber War and other Cyber Threats. Center for Strategic & International Studies, Washington, DC (2002)

    Google Scholar 

  • Minelli, M., Chambers, M., Dhiraj, A.: Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today’s Businesses. John Wiley & Sons, New York (2012)

    Google Scholar 

  • Morris, T.I., Mayron, L.M., Smith, W.B., Knepper, M.M., Ita, R., Fox, K.L.: A perceptually-relevant model-based cyber threat prediction method for enterprise mission assurance. In: 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 60–65. IEEE, February 2011

    Google Scholar 

  • Musliner, D.J., Rye, J.M., Thomsen, D., McDonald, D.D., Burstein, M.H., Robertson, P.: Fuzzbuster: towards adaptive immunity from cyber threats. In: 2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW), pp. 137–140. IEEE, October 2011

    Google Scholar 

  • O’Hara, G.: Cyber-Espionage: a Growing threat to the american economy. CommLaw Conspectus 19, 241 (2010)

    MathSciNet  Google Scholar 

  • Pournouri, S., Craven, M.: E-business, recent threats and security countermeasures. Int. J. Electron. Secur. Digit. Forensics 6(3), 169–184 (2014)

    Article  Google Scholar 

  • Schreiber-Ehle, S., Koch, W.: The JDL model of data fusion applied to cyber-defence—a review paper. In: 2012 Workshop on Sensor Data Fusion: Trends, Solutions, Applications (SDF), pp. 116–119. IEEE, September 2012

    Google Scholar 

  • Steele, R.: Open source intelligence. In: Handbook of Intelligence Studies, pp. 129–147 (2007)

    Google Scholar 

  • Verborgh, R., De Wilde, M.: Using OpenRefine. Packt Publishing Ltd. (2013)

    Google Scholar 

  • Wu, J., Yin, L., Guo, Y.: Cyber attacks prediction model based on Bayesian network. In: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS), pp. 730–731. IEEE, December 2012

    Google Scholar 

  • Yaar, A., Perrig, A., Song, D.: Pi: A path identification mechanism to defend against DDoS attacks. In: Proceedings of 2003 Symposium on Security and Privacy, pp. 93–107. IEEE, May 2003

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sina Pournouri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Pournouri, S., Akhgar, B., Bayerl, P.S. (2016). Cyber Attacks Analysis Using Decision Tree Technique for Improving Cyber Situational Awareness. In: Jahankhani, H., et al. Global Security, Safety and Sustainability - The Security Challenges of the Connected World. ICGS3 2017. Communications in Computer and Information Science, vol 630. Springer, Cham. https://doi.org/10.1007/978-3-319-51064-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51064-4_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51063-7

  • Online ISBN: 978-3-319-51064-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics