Abstract
Cyber Security experts are trying to find solutions to prevent cyber-attacks and one of the main solutions is improving cyber situational awareness which leads to an extensive overview of the current situation in cyber space and gives prediction ability to managers to prevent future cyber threats. In this paper we aim to improve cyber situational awareness by analysing past cyber incidents in 2015 and for this purpose Open Source Intelligence has been chosen as main source of initial dataset and also Decision tree method has been used as a classification technique and a predictive approach in order to analyse the data.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ahn, S.H., Kim, N.U., Chung, T.M.: Big data analysis system concept for detecting unknown attacks. In: 16th International Conference on Advanced Communication Technology, pp. 269–272. IEEE, February 2014
Barford, P., Dacier, M., Dietterich, T.G., Fredrikson, M., Giffin, J., Jajodia, S., Wang, C.: Cyber SA: Situational Awareness for Cyber Defense, pp. 3–14 (2010)
Bhardwaj, V., Johari, R.: Big data analysis: issues and challenges. In: 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), pp. 1–6. IEEE, January 2015
Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderson, R.: Chip and Skim: cloning EMV cards with the pre-play attack. In: 2014 IEEE Symposium on Security and Privacy, pp. 49–64. IEEE, May 2014
Boyd, S.W., Keromytis, A.D.: SQLrand: preventing SQL injection attacks. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 292–302. Springer Berlin Heidelberg, Berlin, Heidelberg (2004). doi:10.1007/978-3-540-24852-1_21
Das, S., Mukhopadhyay, A., Shukla, G.K.: i-HOPE framework for predicting cyber breaches: a logit approach. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 3008–3017. IEEE, January 2013
Dutt, V., Ahn, Y.S., Gonzalez, C.: Cyber situation awareness modeling detection of cyber attacks with instance-based learning theory. Hum. Factors J. Hum. Factors Ergon. Soc. 55(3), 605–618 (2013)
EMC Education Services, Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data. John Wiley & Sons (2015)
Endler, D.: The evolution of cross site scripting attacks. Technical report, iDEFENSE Labs (2002)
Estrada, E.: Network robustness to targeted attacks. The interplay of expansibility and degree distribution. Eur. Phys. J. B 52(4), 563–574 (2006)
Fayyad, S., Meinel, C.: Attack scenario prediction methodology. In: 2013 Tenth International Conference on Information Technology: New Generations (ITNG), pp. 53–59. IEEE, April 2013
Feasel, J., Romas, G.: Visualization, Modeling and Predictive Analysis of Internet Attacks, vol. 8768, pp. 1–6 (2013)
Gordon, S., Ford, R.: On the definition and classification of cybercrime. J. Comput. Virol. 2(1), 13–20 (2006)
Grossman, J.: XSS Attacks: Cross-site scripting exploits and defense. Syngress (2007)
Himma, K.E.: Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? SSRN 799545 (2005)
Householder, A., Houle, K., Dougherty, C.: Computer attack trends challenge Internet security. Computer 35(4), 5–7 (2002)
Jackson, C., Barth, A., Bortz, A., Shao, W., Boneh, D.: Protecting browsers from DNS rebinding attacks. ACM Trans. Web (TWEB) 3(1), 2 (2009)
Kumar, V., Srivastava, J., Lazarevic, A. (eds.): Managing Cyber Threats: Issues, Approaches, and Challenges, vol. 5. Springer Science & Business Media, Heidelberg (2006)
Lewis, J.A.: Assessing the Risks of Cyber Terrorism, Cyber War and other Cyber Threats. Center for Strategic & International Studies, Washington, DC (2002)
Minelli, M., Chambers, M., Dhiraj, A.: Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today’s Businesses. John Wiley & Sons, New York (2012)
Morris, T.I., Mayron, L.M., Smith, W.B., Knepper, M.M., Ita, R., Fox, K.L.: A perceptually-relevant model-based cyber threat prediction method for enterprise mission assurance. In: 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 60–65. IEEE, February 2011
Musliner, D.J., Rye, J.M., Thomsen, D., McDonald, D.D., Burstein, M.H., Robertson, P.: Fuzzbuster: towards adaptive immunity from cyber threats. In: 2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW), pp. 137–140. IEEE, October 2011
O’Hara, G.: Cyber-Espionage: a Growing threat to the american economy. CommLaw Conspectus 19, 241 (2010)
Pournouri, S., Craven, M.: E-business, recent threats and security countermeasures. Int. J. Electron. Secur. Digit. Forensics 6(3), 169–184 (2014)
Schreiber-Ehle, S., Koch, W.: The JDL model of data fusion applied to cyber-defence—a review paper. In: 2012 Workshop on Sensor Data Fusion: Trends, Solutions, Applications (SDF), pp. 116–119. IEEE, September 2012
Steele, R.: Open source intelligence. In: Handbook of Intelligence Studies, pp. 129–147 (2007)
Verborgh, R., De Wilde, M.: Using OpenRefine. Packt Publishing Ltd. (2013)
Wu, J., Yin, L., Guo, Y.: Cyber attacks prediction model based on Bayesian network. In: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS), pp. 730–731. IEEE, December 2012
Yaar, A., Perrig, A., Song, D.: Pi: A path identification mechanism to defend against DDoS attacks. In: Proceedings of 2003 Symposium on Security and Privacy, pp. 93–107. IEEE, May 2003
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Pournouri, S., Akhgar, B., Bayerl, P.S. (2016). Cyber Attacks Analysis Using Decision Tree Technique for Improving Cyber Situational Awareness. In: Jahankhani, H., et al. Global Security, Safety and Sustainability - The Security Challenges of the Connected World. ICGS3 2017. Communications in Computer and Information Science, vol 630. Springer, Cham. https://doi.org/10.1007/978-3-319-51064-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-51064-4_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51063-7
Online ISBN: 978-3-319-51064-4
eBook Packages: Computer ScienceComputer Science (R0)