Abstract:
As adversary activities move into cyber domains, attacks are not necessarily associated with physical entities. As a result, observations of an enemy's course of action (...Show MoreMetadata
Abstract:
As adversary activities move into cyber domains, attacks are not necessarily associated with physical entities. As a result, observations of an enemy's course of action (eCoA) may be sporadic, or non-uniform, with potentially more missing and noisy data. Traditional classification methods, in this case, can become ineffective to differentiate correlated observations or attack tracks. This paper formalizes this new challenge and discusses three solution approaches from seemingly unrelated fields. This attempt sheds new light to the problem of classifying unknown types of non-uniform cyber attack tracks.
Published in: 2009 12th International Conference on Information Fusion
Date of Conference: 06-09 July 2009
Date Added to IEEE Xplore: 18 August 2009
Print ISBN:978-0-9824-4380-4
Conference Location: Seattle, WA
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Unsupervised Learning ,
- Noisy Data ,
- Traditional Classification Methods ,
- Social Networks ,
- Distancing Measures ,
- Measurement Values ,
- Clustering Algorithm ,
- Fast Fourier Transform ,
- Frequency Response ,
- Linear Interpolation ,
- Time Sequence ,
- Frequency Components ,
- Betweenness ,
- Fourier Analysis ,
- Low-frequency Components ,
- Cluster Nodes ,
- Cluster C ,
- Track Length ,
- Malicious Activities ,
- Intrusion Detection System ,
- Social Network Approach ,
- Subsequent Matching ,
- Common Subsequence ,
- K-means Algorithm ,
- Social Approach ,
- Similarity Measure ,
- Numerical Values
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Unsupervised Learning ,
- Noisy Data ,
- Traditional Classification Methods ,
- Social Networks ,
- Distancing Measures ,
- Measurement Values ,
- Clustering Algorithm ,
- Fast Fourier Transform ,
- Frequency Response ,
- Linear Interpolation ,
- Time Sequence ,
- Frequency Components ,
- Betweenness ,
- Fourier Analysis ,
- Low-frequency Components ,
- Cluster Nodes ,
- Cluster C ,
- Track Length ,
- Malicious Activities ,
- Intrusion Detection System ,
- Social Network Approach ,
- Subsequent Matching ,
- Common Subsequence ,
- K-means Algorithm ,
- Social Approach ,
- Similarity Measure ,
- Numerical Values
- Author Keywords