Dr Harsha Kalutarage h.kalutarage@rgu.ac.uk
Lecturer
Dr Harsha Kalutarage h.kalutarage@rgu.ac.uk
Lecturer
Siraj Ahmed Shaikh
Nick Heard
Editor
Niall Adams
Editor
Patrick Rubin-Delanchy
Editor
Melissa Turcotte
Editor
An effective cyber early warning system (CEWS) should pick up threat activity at an early stage, with an emphasis on establishing hypotheses and predictions as well as generating alerts on (unclassified) situations based on preliminary indications. The design and implementation of such early warning systems involve numerous challenges such as generic set of indicators, intelligence gathering, uncertainty reasoning and information fusion. This chapter begins with an understanding of the behaviours of intruders and then related literature is followed by the proposed methodology using a Bayesian inference-based system. It also includes a carefully deployed empirical analysis on a data set labelled for reconnaissance activity. Finally, the chapter concludes with a discussion on results, research challenges and necessary suggestions to move forward in this research line.
KALUTARAGE, H.K. and SHAIKH, S.A. 2018. Feature trade-off analysis for reconnaissance detection. In Heard, N., Adams, N., Rubin-Delanchy, P. and Turcotte, M. (eds.) Data science for cyber security. Security science and technology, 3. London: World Scientific [online], chapter 5, pages 95-126. Available from: https://doi.org/10.1142/9781786345646_005
Acceptance Date | Oct 8, 2018 |
---|---|
Online Publication Date | Nov 30, 2018 |
Publication Date | Nov 30, 2018 |
Deposit Date | Sep 1, 2020 |
Publicly Available Date | Sep 7, 2020 |
Publisher | World Scientific Publishing |
Pages | 95-126 |
Series Title | Security science and technology |
Series Number | 3 |
Series ISSN | 2059-1063 |
Book Title | Data science for cyber-security |
Chapter Number | Chapter 5 |
ISBN | 9781786345639 |
DOI | https://doi.org/10.1142/9781786345646_005 |
Keywords | Cyber early warning system; Intruders; Behaviours; Threat; Reconnaissance |
Public URL | https://rgu-repository.worktribe.com/output/249210 |
KALUTARAGE 2018 Feature trade off (AAM)
(1.6 Mb)
PDF
Publisher Licence URL
https://creativecommons.org/licenses/by-nc/4.0/
AI-based intrusion detection systems for in-vehicle networks: a survey.
(2023)
Journal Article
DQR: a double Q learning multi agent routing protocol for wireless medical sensor network.
(2023)
Conference Proceeding
Android source code vulnerability detection: a systematic literature review.
(2023)
Journal Article
RRP: a reliable reinforcement learning based routing protocol for wireless medical sensor networks.
(2023)
Conference Proceeding
Resource efficient federated deep learning for IoT security monitoring.
(2022)
Conference Proceeding
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Advanced Search