DeepAI
Log In Sign Up

Investigation on Research Ethics and Building a Benchmark

11/26/2020
by   Shun Inagaki, et al.
0

When dealing with leading edge cyber security research, especially when operating from the perspective of an attacker or a red team, it becomes necessary for one to at times consider how ethics comes into play. There are currently no cyber security-specific ethics standards, which in particular is one reason more adversarial cyber security research lags behind in Japan. In this research, using machine learning and manual methods we extracted best practices for research ethics from past top conference papers. Using this knowledge we constructed an ethics knowledge base for cyber security research. Such a knowledge base can be used to properly distinguish grey-area research so that it is not wrongly forbidden. Using a decision tree-style user interface that we created for our knowledge base, researchers may be able to efficiently identify which aspects of their research require ethical consideration. In this work, as a preliminary step we focused on only a portion of the areas of research covered by cyber security conferences, but our results are applicable to any area of research.

READ FULL TEXT
11/05/2020

Knowledge-Base Practicality for Cybersecurity Research Ethics Evaluation

Research ethics in Information and Communications Technology has seen a ...
02/25/2020

CybORG: An Autonomous Cyber Operations Research Gym

Autonomous Cyber Operations (ACO) involves the consideration of blue tea...
08/20/2021

CybORG: A Gym for the Development of Autonomous Cyber Agents

Autonomous Cyber Operations (ACO) involves the development of blue team ...
04/10/2022

A review of knowledge graph application scenarios in cyber security

Facing the dynamic complex cyber environments, internal and external cyb...
11/23/2022

Principled Data-Driven Decision Support for Cyber-Forensic Investigations

In the wake of a cybersecurity incident, it is crucial to promptly disco...
03/11/2020

Passlab: A Password Security Tool for the Blue Team

If we wish to compromise some password-protected system as an attacker (...