Data farming for cyber security : an agent-based modelling approach
Organisations are increasingly challenged by advanced malware's persistent evasive intrusions. Cyber security analytics provide promising possibilities for defences to catch up. However, there are challenges to cyber security analytics development. The unknown and constantly evolving cyber atta...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/144712 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-144712 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1447122023-03-05T15:57:30Z Data farming for cyber security : an agent-based modelling approach Pan, Jonathan Wee Kim Wee School of Communication and Information Social sciences::Communication Cyber Security Analytics Data Farming Organisations are increasingly challenged by advanced malware's persistent evasive intrusions. Cyber security analytics provide promising possibilities for defences to catch up. However, there are challenges to cyber security analytics development. The unknown and constantly evolving cyber attack patterns poses much challenge to the effectiveness of detection algorithms. This research deals with this challenge to cyber security analytics development by proposing the use of data farming techniques to produce data containing varied simulated conditions. This in turn could facilitate cyber security analytics development. Data farming is used in military strategic planning to identify possible unknowns and subsequently develop defensive countermeasures. This proposition entails the use of agent-based modelling to simulate the computing environment involving various actors including the malware. The output of the model is farmed data that contains weblog network behaviour information. The data is then verified using anomaly detection statistical techniques as part of model verification. Accepted version 2020-11-20T04:37:03Z 2020-11-20T04:37:03Z 2016 Journal Article Pan, J. (2016). Data farming for cyber security : an agent based modelling approach. International Journal of Information Privacy, Security and Integrity, 2(3), 197-215. doi:10.1504/IJIPSI.2016.078590 1741-8496 https://hdl.handle.net/10356/144712 10.1504/IJIPSI.2016.078590 3 2 197 215 en International Journal of Information Privacy, Security and Integrity © 2016 Inderscience. All rights reserved. This paper was published in International Journal of Information Privacy, Security and Integrity and is made available with permission of Inderscience. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Social sciences::Communication Cyber Security Analytics Data Farming |
spellingShingle |
Social sciences::Communication Cyber Security Analytics Data Farming Pan, Jonathan Data farming for cyber security : an agent-based modelling approach |
description |
Organisations are increasingly challenged by advanced malware's persistent evasive intrusions. Cyber security analytics provide promising possibilities for defences to catch up. However, there are challenges to cyber security analytics development. The unknown and constantly evolving cyber attack patterns poses much challenge to the effectiveness of detection algorithms. This research deals with this challenge to cyber security analytics development by proposing the use of data farming techniques to produce data containing varied simulated conditions. This in turn could facilitate cyber security analytics development. Data farming is used in military strategic planning to identify possible unknowns and subsequently develop defensive countermeasures. This proposition entails the use of agent-based modelling to simulate the computing environment involving various actors including the malware. The output of the model is farmed data that contains weblog network behaviour information. The data is then verified using anomaly detection statistical techniques as part of model verification. |
author2 |
Wee Kim Wee School of Communication and Information |
author_facet |
Wee Kim Wee School of Communication and Information Pan, Jonathan |
format |
Article |
author |
Pan, Jonathan |
author_sort |
Pan, Jonathan |
title |
Data farming for cyber security : an agent-based modelling approach |
title_short |
Data farming for cyber security : an agent-based modelling approach |
title_full |
Data farming for cyber security : an agent-based modelling approach |
title_fullStr |
Data farming for cyber security : an agent-based modelling approach |
title_full_unstemmed |
Data farming for cyber security : an agent-based modelling approach |
title_sort |
data farming for cyber security : an agent-based modelling approach |
publishDate |
2020 |
url |
https://hdl.handle.net/10356/144712 |
_version_ |
1759853500069576704 |