Dr Harsha Kalutarage h.kalutarage@rgu.ac.uk
Lecturer
Dr Harsha Kalutarage h.kalutarage@rgu.ac.uk
Lecturer
Siraj Ahmed Shaikh
Nick Heard
Editor
Niall Adams
Editor
Patrick Rubin-Delanchy
Editor
Melissa Turcotte
Editor
An effective cyber early warning system (CEWS) should pick up threat activity at an early stage, with an emphasis on establishing hypotheses and predictions as well as generating alerts on (unclassified) situations based on preliminary indications. The design and implementation of such early warning systems involve numerous challenges such as generic set of indicators, intelligence gathering, uncertainty reasoning and information fusion. This chapter begins with an understanding of the behaviours of intruders and then related literature is followed by the proposed methodology using a Bayesian inference-based system. It also includes a carefully deployed empirical analysis on a data set labelled for reconnaissance activity. Finally, the chapter concludes with a discussion on results, research challenges and necessary suggestions to move forward in this research line.
KALUTARAGE, H.K. and SHAIKH, S.A. 2018. Feature trade-off analysis for reconnaissance detection. In Heard, N., Adams, N., Rubin-Delanchy, P. and Turcotte, M. (eds.) Data science for cyber security. Security science and technology, 3. London: World Scientific [online], chapter 5, pages 95-126. Available from: https://doi.org/10.1142/9781786345646_005
Acceptance Date | Oct 8, 2018 |
---|---|
Online Publication Date | Nov 30, 2018 |
Publication Date | Nov 30, 2018 |
Deposit Date | Sep 1, 2020 |
Publicly Available Date | Sep 7, 2020 |
Publisher | World Scientific Publishing |
Pages | 95-126 |
Series Title | Security science and technology |
Series Number | 3 |
Series ISSN | 2059-1063 |
Book Title | Data science for cyber-security |
Chapter Number | Chapter 5 |
ISBN | 9781786345639 |
DOI | https://doi.org/10.1142/9781786345646_005 |
Keywords | Cyber early warning system; Intruders; Behaviours; Threat; Reconnaissance |
Public URL | https://rgu-repository.worktribe.com/output/249210 |
KALUTARAGE 2018 Feature trade off (AAM)
(1.6 Mb)
PDF
Publisher Licence URL
https://creativecommons.org/licenses/by-nc/4.0/
Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security.
(2022)
Conference Proceeding
Developing secured android applications by mitigating code vulnerabilities with machine learning.
(2022)
Conference Proceeding
Robust, effective and resource efficient deep neural network for intrusion detection in IoT networks.
(2022)
Conference Proceeding
Improving intrusion detection through training data augmentation.
(2021)
Conference Proceeding
Reasoning with counterfactual explanations for code vulnerability detection and correction.
(2021)
Conference Proceeding
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Advanced Search