Visible to the public Feature Extraction and Selection Method of Cyber-Attack and Threat Profiling in Cybersecurity Audit

TitleFeature Extraction and Selection Method of Cyber-Attack and Threat Profiling in Cybersecurity Audit
Publication TypeConference Paper
Year of Publication2019
AuthorsZakaria, Khairun Nisyak, Zainal, Anazida, Othman, Siti Hajar, Kassim, Mohamad Nizam
Conference Name2019 International Conference on Cybersecurity (ICoCSec)
Keywordsaggressive cyber landscape, auditing, complicated cyber landscapes, cyber threats, cyber-attack, cyber-attacks, cybersecurity audit, cybersecurity audit execution, feature extraction, feature extraction and selection, feature selection, Human Behavior, pubcrawl, Resiliency, Scalability, Security Audits, security of data, threat profiling
AbstractPublic sector and private organizations began using cybersecurity control in order to defend their assets against cybercriminals attack. Cybersecurity audits assist organizations to deal with cyber threats, cybercriminals, and cyber-attacks thatare growing in an aggressive cyber landscape. However, cyber-attacks and threats become more increase and complex in complicated cyber landscapes challenge auditors to perform an effective cybersecurity audit. This current situation puts in evidens ce the critical need for a new approach in the cybersecurity audit execution. This study reviews an alternative method in the execution of cybersecurity security checks. The analysis is on the character and behavioral of cyber-attacks and threats using feature extraction and selection method to get crucial elements from the common group of cyber-attacks and threats. Cyber-attacks and threats profile are systematic approaches driven by a clear understanding of the form of cyber-attacks and threats character and behavior patterns in cybersecurity requirements. As a result, this study proposes cyber-attacks and threats profiling for cybersecurity audit as a set of control elements that are harmonized with audit components that drive audits based on cyber threats.
DOI10.1109/ICoCSec47621.2019.8970786
Citation Keyzakaria_feature_2019