Browse > Article
http://dx.doi.org/10.33778/kcsa.2020.20.3.115

Cyber Threats Prediction model based on Artificial Neural Networks using Quantification of Open Source Intelligence (OSINT)  

Lee, Jongkwan (육군사관학교 컴퓨터학과)
Moon, Minam (육군사관학교 수학과)
Shin, Kyuyong (육군사관학교 컴퓨터학과)
Kang, Sungrok (육군사관학교 심리경영학과)
Publication Information
Abstract
Cyber Attack have evolved more and more in recent years. One of the best countermeasure to counter this advanced and sophisticated cyber threat is to predict cyber attacks in advance. It requires a lot of information and effort to predict cyber threats. If we use Open Source Intelligence(OSINT), the core of recent information acquisition, we can predict cyber threats more accurately. In order to predict cyber threats using OSINT, it is necessary to establish a Database(DB) for cyber attacks from OSINT and to select factors that can evaluate cyber threats from the established DB. We are based on previous researches that built a cyber attack DB using data mining and analyzed the importance of core factors among accumulated DG factors by AHP technique. In this research, we present a method for quantifying cyber threats and propose a cyber threats prediction model based on artificial neural networks.
Keywords
Open Source Intelligence(OSINT); Artificial Neural Network; Cyber Threats; Prediction model;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Kuyoung Shin, Jinchel Yoo, Changhee Han, et al., "A study on building a cyber attack database using Open Source Intelligence(OSINT)", Convergence Security Journal 19(2), pp. 113-133, 2019.
2 Sungrok Kang, Minam Moon, Kyuyoung Shin, Joogkwan Lee, "A study on Priority Analysis of Evaluation Factors for Cyber Threats using Open Source Intelligence(OSINT)", Convergence Security Journal 20(1), pp. 49-57, 2020.
3 C. W. Geib and R. P. Goldman, "Plan recognition in intrusion detection systems," in DARPA Information Survivability Conference amp; Exposition II, 2001. DISCEX '01. Proceedings, 2001.
4 A. A. Ahmed and N. A. K. Zaman, "Attack intention recognition: A review," IJ Network Security, vol. 19, no. 2, pp. 244-250, 2017.
5 A. A. Ahmed and N. A. K. Zaman, "Attack intention recognition: A review," IJ Network Security, 2017.
6 M. Abdlhamed, K. Kifayat, Q. Shi, and W. Hurst, "Intrusion Prediction Systems". Cham: Springer International Publishing, 2017.
7 K. Huang, C. Zhou, Y. C. Tian, S. Yang, and Y. Qin, "Assessing the physical impact of cyberattacks on industrial cyber-physical systems," IEEE Transactions on Industrial Electronics, vol. 65, no. 10, 2018.
8 A. Bar, B. Shapira, L. Rokach, and M. Unger, "Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis," in Software Science, Technology and Engineering (SWSTE), 2016 IEEE International Conference on.IEEE, 2016.
9 M. Abdlhamed, K. Kifayat, Q. Shi, and W. Hurst, "A system for intrusion prediction in cloud computing," in Proceedings of the International Conference on Internet of Things and Cloud Computing, ser. ICC '16.New York, NY, USA: ACM, 2016.
10 G. Werner, S. Yang, and K. McConky, "Time series forecasting of cyber attack intensity," in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, ser. CISRC '17. New York, NY, USA: ACM, 2017.
11 N. Polatidis, E. Pimenidis, M. Pavlidis, and H. Mouratidis, "Recommender systems meeting security: From product recommendation to cyber-attack prediction," in Engineering Applications of Neural Networks. Cham: Springer International Publishing, 2017.
12 Y.-B. Leau and S. Manickam, "A Novel Adaptive Grey Verhulst Model for Network Security Situation Prediction," International Journal of Advanced Computer Science & Applications, vol. 1, no. 7, 2016.
13 F. He, Y. Zhang, D. Liu, Y. Dong, C. Liu, and C. Wu, "Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis," in Network and System Security. Cham: Springer International Publishing, 2017.
14 G. K. Jayasinghe, J. S. Culpepper, and P. Bertok, "Efficient and effective realtime prediction of drive-by download attacks," Journal of Network and Computer Applications, vol. 38, pp. 135-149, 2014.   DOI
15 Y.-H. Kim and W. H. Park, "A study on cyber threat prediction based on intrusion detection event for apt attack detection," Multimedia Tools and Applications, vol. 71, no. 2, pp. 685-698, Jul 2014.   DOI
16 Goodfellow, Ian, et al. "Deep learning," Vol. 1. Cambridge: MIT press, 2016.
17 Abiodun, Oludare Isaac, et al. "State-of-the-art in artificial neural network applications: A survey." Heliyon, Vol. 4. No. 11, 2018.
18 Wang, Lin, et al. "Optimal forecast combination based on neural networks for time series forecasting." Applied soft computing 66, pp. 1-17, 2018.   DOI
19 Singh, Navneet, Asheesh Singh, and Manoj Tripathy. "Selection of hidden layer neurons and best training method for ffnn in application of long term load forecasting." Journal of electrical engineering, Vol. 63, No.3, pp. 153-16, 2012.   DOI