Machine Learning for Real-Time Data-Driven Security Practices
Title | Machine Learning for Real-Time Data-Driven Security Practices |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Coleman, M. S., Doody, D. P., Shields, M. A. |
Conference Name | 2018 29th Irish Signals and Systems Conference (ISSC) |
ISBN Number | 978-1-5386-6046-1 |
Keywords | AUC evaluation metric, Collaboration, collaborative filtering, cosine similarity measure, cyber security, cyber security information utilising, cyber-attacks, cyber-security vulnerability information, damage, human factors, item-based, Item-Based approaches, Item-Based technique, learning (artificial intelligence), Measurement, memory-based, Memory-Based Collaborative Filtering technique, national vulnerability database, optimum system parameters, pubcrawl, real-time data-driven security practices, Real-time Systems, recommender systems, resilience, Resiliency, Scalability, security of data, similarity-based ranking, Software, user-based, User-Based technique, vulnerability breach, vulnerable organisations |
Abstract | The risk of cyber-attacks exploiting vulnerable organisations has increased significantly over the past several years. These attacks may combine to exploit a vulnerability breach within a system's protection strategy, which has the potential for loss, damage or destruction of assets. Consequently, every vulnerability has an accompanying risk, which is defined as the "intersection of assets, threats, and vulnerabilities" [1]. This research project aims to experimentally compare the similarity-based ranking of cyber security information utilising a recommendation environment. The Memory-Based Collaborative Filtering technique was employed, specifically the User-Based and Item-Based approaches. These systems utilised information from the National Vulnerability Database, specifically for the identification and similarity-based ranking of cyber-security vulnerability information, relating to hardware and software applications. Experiments were performed using the Item-Based technique, to identify the optimum system parameters, evaluated through the AUC evaluation metric. Once identified, the Item-Based technique was compared with the User-Based technique which utilised the parameters identified from the previous experiments. During these experiments, the Pearson's Correlation Coefficient and the Cosine similarity measure was used. From these experiments, it was identified that utilised the Item-Based technique which employed the Cosine similarity measure, an AUC evaluation metric of 0.80225 was achieved. |
URL | https://ieeexplore.ieee.org/document/8585360 |
DOI | 10.1109/ISSC.2018.8585360 |
Citation Key | coleman_machine_2018 |
- Scalability
- national vulnerability database
- optimum system parameters
- pubcrawl
- real-time data-driven security practices
- real-time systems
- recommender systems
- resilience
- Resiliency
- Memory-Based Collaborative Filtering technique
- security of data
- similarity-based ranking
- Software
- user-based
- User-Based technique
- vulnerability breach
- vulnerable organisations
- AUC evaluation metric
- memory-based
- Measurement
- learning (artificial intelligence)
- Item-Based technique
- Item-Based approaches
- item-based
- Human Factors
- damage
- cyber-security vulnerability information
- cyber-attacks
- cyber security information utilising
- cyber security
- cosine similarity measure
- collaborative filtering
- collaboration