AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection

  • Kotenko I
  • Doynikova E
  • Chechulin A
  • et al.
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter considers methods and techniques for analytical processing of cyber security events and information. The approach suggested in the chapter is based on calculating a set of cyber security metrics suited for automatic- and human-based perception and analysis of cyber situation and suits for automated countermeasure response in a near real-time mode. To fulfil security assessments and make countermeasure decisions, artificial intelligence (AI)-based methods and techniques, including Bayesian, ontological and any-time mechanisms, are implemented. Different kinds of data are used: data from SIEM systems, data accumulated during security monitoring, and data generated by the word community in external databases of attacks, vulnerabilities and incidents for typical and special-purpose computer systems. To calculate integral metrics, the analytical models of evaluation objects are applied. To specify security objects and interrelationships among them, an ontological repository is realised. It joins data from various security databases and specifies techniques of logical inference to get answers on security-related requests. The suggested approach is demonstrated using several case studies.

Cite

CITATION STYLE

APA

Kotenko, I., Doynikova, E., Chechulin, A., & Fedorchenko, A. (2018). AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection (pp. 101–130). https://doi.org/10.1007/978-3-319-92624-7_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free