Cyber-Attack Consequence Prediction

12/01/2020
by   Prerit Datta, et al.
0

Cyber-physical systems posit a complex number of security challenges due to interconnection of heterogeneous devices having limited processing, communication, and power capabilities. Additionally, the conglomeration of both physical and cyber-space further makes it difficult to devise a single security plan spanning both these spaces. Cyber-security researchers are often overloaded with a variety of cyber-alerts on a daily basis many of which turn out to be false positives. In this paper, we use machine learning and natural language processing techniques to predict the consequences of cyberattacks. The idea is to enable security researchers to have tools at their disposal that makes it easier to communicate the attack consequences with various stakeholders who may have little to no cybersecurity expertise. Additionally, with the proposed approach researchers' cognitive load can be reduced by automatically predicting the consequences of attacks in case new attacks are discovered. We compare the performance through various machine learning models employing word vectors obtained using both tf-idf and Doc2Vec models. In our experiments, an accuracy of 60 using Doc2Vec method for models based on LinearSVC model.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/17/2022

Attacking Digital Twins of Robotic Systems to Compromise Security and Safety

Security and safety are of paramount importance to human-robot interacti...
research
06/03/2021

Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks

To understand how end-users conceptualize consequences of cyber security...
research
08/17/2022

On the Elements of Datasets for Cyber Physical Systems Security

Datasets are essential to apply AI algorithms to Cyber Physical System (...
research
12/08/2018

A Multilevel Cybersecurity and Safety Monitor for Embedded Cyber-Physical Systems

Cyber-physical systems (CPS) are composed of various embedded subsystems...
research
08/24/2018

Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis

Today, there is a plethora of software security tools employing visualiz...
research
09/24/2019

Mining user interaction patterns in the darkweb to predict enterprise cyber incidents

With rise in security breaches over the past few years, there has been a...
research
05/28/2021

The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs

The security of FPGAs is a crucial topic, as any vulnerability within th...

Please sign up or login with your details

Forgot password? Click here to reset