Ontology-Driven Cyber-Security Threat Assessment Based on Sentiment Analysis of Network Activity Data

被引:6
作者
Lundquist, Doug [1 ]
Zhang, Kunpeng [1 ]
Ouksel, Aris [1 ]
机构
[1] Univ Illinois, Dept Informat & Decis Sci, Chicago, IL 60680 USA
来源
2014 INTERNATIONAL CONFERENCE ON CLOUD AND AUTONOMIC COMPUTING (ICCAC 2014) | 2014年
关键词
Cyber-security; ontology; threat assessment; sentiment analysis; semantic reconciliation;
D O I
10.1109/ICCAC.2014.42
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sentiment analysis is gaining acceptance as a tool for automated understanding of consumer attitudes and preferences. Based on well-designed rule sets that describe how most people express their sentiments, sentiment analysis models enable automated processes to understand human responses. In this paper, we describe our vision of extending sentiment analysis to the novel domain of cyber-security. Our proposal combines: 1) ontological modeling of attacks, defenses, and attacker goals; 2) sentiment analysis of combinations of elements indicative of probable attacks; and 3) semantic reconciliation of borderline cases to more definitively classify ambiguous network activity as threatening or innocuous. This method has achieved good results (86% correct) in assessing consumer sentiments, and we believe that more detailed models can improve on this accuracy even in the complex domain of cyber-security.
引用
收藏
页码:5 / 14
页数:10
相关论文
共 21 条
  • [1] [Anonymous], 2010, P INT AAAI C WEBL SO
  • [2] Berthier R., 2012, CYB CYB PHYS SYST WO
  • [3] Binde Beth., 2011, Assessing outbound traffic to uncover advanced persistent threat
  • [4] Bo Pang, 2008, Foundations and Trends in Information Retrieval, V2, P1, DOI 10.1561/1500000001
  • [5] Cardenas A., 2012, CYB CYB PHYS SYST WO
  • [6] Colace F., 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), P130, DOI 10.1109/IMIS.2012.128
  • [7] Frye L., 2011, INT C SEC MAN LAS VE
  • [8] Huang HD, 2012, POWER FUZZY MARKUP L, P113
  • [9] Lee Martin., 2011, Virus Bulletin Conference, V26, P1
  • [10] Leita C., 2012, CYB CYB PHYS SYST WO