A Data Driven Approach for the Science of Cyber Security: Challenges and Directions
Title | A Data Driven Approach for the Science of Cyber Security: Challenges and Directions |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Thuraisingham, B., Kantarcioglu, M., Hamlen, K., Khan, L., Finin, T., Joshi, A., Oates, T., Bertino, E. |
Conference Name | 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI) |
Keywords | attack detection, attack mitigation, Cognition, Collaboration, composability, computer security, Context, data driven approach, data driven science, data trustworthiness, Forensics, Human Behavior, human factors, Measurement, Metrics, Ontologies, policy-based sharing, Policy-Governed Secure Collaboration, pubcrawl, Resiliency, risk-based approach, Scalability, science of cyber security, science of security, security metrics, security of data, SoS, Trusted Computing |
Abstract | This paper describes a data driven approach to studying the science of cyber security (SoS). It argues that science is driven by data. It then describes issues and approaches towards the following three aspects: (i) Data Driven Science for Attack Detection and Mitigation, (ii) Foundations for Data Trustworthiness and Policy-based Sharing, and (iii) A Risk-based Approach to Security Metrics. We believe that the three aspects addressed in this paper will form the basis for studying the Science of Cyber Security. |
URL | https://ieeexplore.ieee.org/document/7785719/ |
DOI | 10.1109/IRI.2016.10 |
Citation Key | thuraisingham_data_2016 |
- Metrics
- Trusted Computing
- sos
- security of data
- Security Metrics
- Science of Security
- science of cyber security
- Scalability
- risk-based approach
- Resiliency
- pubcrawl
- Policy-Governed Secure Collaboration
- policy-based sharing
- Ontologies
- Attack detection
- Measurement
- Human Factors
- Human behavior
- Forensics
- data trustworthiness
- data driven science
- data driven approach
- Context
- computer security
- composability
- collaboration
- cognition
- attack mitigation