A Feedback-based Evaluation Approach for the Continuous Adjustment of Incident Prioritization

被引:3
作者
Renners, Leonard [1 ]
Heine, Felix [1 ]
Kleiner, Carsten [1 ]
Rodosek, Gabi Dreo [2 ]
机构
[1] Univ Appl Sci & Arts, Hsch Hannover, D-30459 Hannover, Germany
[2] Univ Bundeswehr Muenchen, D-85577 Neubiberg, Germany
来源
2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018) | 2018年
关键词
D O I
10.1109/ICDIS.2018.00036
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Incident Prioritization is a technique that evaluates security incidents to derive a priority in order to enable an analyst to focus on the most important events first. It is traditionally based on a set of static calculations, which are rarely adjusted. Especially since there is no explicit process to identify errors and improvements are made and evaluated manually on a best guess basis. This leads to issues when changes occur, as due to shifting concepts, new entities and attacks or changing guidelines. In this paper, we discuss the requirements and an approach to assist in a continuous tuning of the incident prioritization model. We develop a process that involves feedback from an analyst in order to evaluate potential improvements. This process includes mechanisms to quickly identify incorrect ratings and supports the selection of a new model and its establishment.
引用
收藏
页码:176 / 183
页数:8
相关论文
共 10 条
[1]  
[Anonymous], 2017, IBM XFORCE THREAT IN
[2]  
[Anonymous], 2010, INFORM SECURITY RISK
[3]   How useful is quantitative risk assessment? [J].
Apostolakis, GE .
RISK ANALYSIS, 2004, 24 (03) :515-520
[4]  
Ben-Asher N., 2017, CYBER SECURITY INFOR, V5
[5]   The Operational Role of Security Information and Event Management Systems [J].
Bhatt, Sandeep ;
Manadhata, Pratyusa K. ;
Zomlot, Loai .
IEEE SECURITY & PRIVACY, 2014, 12 (05) :35-41
[6]  
Das S, 2016, IEEE DATA MINING, P853, DOI [10.1109/ICDM.2016.0102, 10.1109/ICDM.2016.164]
[7]  
Ponemon Institute LLC, 2017, TECH REP
[8]   Dynamic Security Risk Management Using Bayesian Attack Graphs [J].
Poolsappasit, Nayot ;
Dewri, Rinku ;
Ray, Indrajit .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) :61-74
[9]  
Renners L, 2017, PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 1, P398, DOI 10.1109/IDAACS.2017.8095112
[10]   AI2: Training a big data machine to defend [J].
Veeramachaneni, Kalyan ;
Arnaldo, Ignacio ;
Korrapati, Varnsi ;
Bassias, Constantinos ;
Li, Ke .
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, :49-54