Skip to main content

Utilizing Chatbots to Increase the Efficacy of Information Security Practitioners

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 593))

Abstract

Almost every day, the world hears about a new information security breach. In many cases, this is due to the vast quantity of data generated across millions of connected devices with little insight, and the amount of work that information security practitioners must do to make sense of it all. The lack of skilled information security resources doesn’t help. Different approaches are being attempted to fix these issues. However, many approaches are neither cost-effective nor scalable. One potential approach, which is both cost-effective and scalable, is the utilization of chatbots. In this paper, the authors focus on ways in which chatbots can assist information security practitioners, such as security analysts and pentesters, beyond the current human-before-support philosophy. Scenarios include investigations of potentially malicious behavior and team pentest projects, each of which explores how a chatbot might allow the relevant type of information security practitioner to be far more effective and efficient.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cisco: Mitigating the cybersecurity skills shortage (2015). http://www.cisco.com/c/dam/en/us/products/collateral/security/cybersecurity-talent.pdf

  2. Business Insider.: The chatbots in banking report: how chatbots can transform digital banking (2017). http://www.businessinsider.com/the-chatbots-in-banking-report-how-chatbots-can-transform-digital-banking-2017-1

  3. McNeal, M., Newyear, D.: Chatbots: automating reference in public libraries. In: Edward, I. (ed.) Robots in Academic Libraries: Advancements in Library Automation, pp. 101–114. IGI Global, Hershey (2013)

    Chapter  Google Scholar 

  4. Garimella, U., Paruchuri, P.: ^ 2: An agent for helping HR with recruitment. Int. J. Agent Technol. Syst. (IJATS) 7(3), 67–85 (2015)

    Article  Google Scholar 

  5. Bhattarai, R., Joyce, G., Dutta, S.: Information security application design: understanding your users. In: International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 103–113, Springer, Cham (2016)

    Google Scholar 

  6. Rapid7: Project sonar https://sonar.labs.rapid7.com/ (n.d.)

  7. Rapid7: Project heisenberg cloud: cross-cloud adversary analytics (2016). https://information.rapid7.com/rs/495-KNT-277/images/rapid7-project-heisenberg-cloud-research-report.pdf

  8. Skape: Metasploit’s meterpreter (2004). https://dev.metasploit.com/documents/meterpreter.pdf

  9. Meyer, R.: Even early focus groups hated clippy (2015). https://www.theatlantic.com/technology/archive/2015/06/clippy-the-microsoft-office-assistant-is-the-patriarchys-fault/396653/

  10. Schlicht, M.: How Bots Will Completely Kill Websites and Mobile Apps (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saurabh Dutta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Dutta, S., Joyce, G., Brewer, J. (2018). Utilizing Chatbots to Increase the Efficacy of Information Security Practitioners. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60585-2_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60584-5

  • Online ISBN: 978-3-319-60585-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics