Merging Datasets of CyberSecurity Incidents for Fun and Insight

被引:3
作者
Abbiati, Giovanni [1 ,2 ]
Ranise, Silvio [2 ,3 ]
Schizzerotto, Antonio [2 ,3 ]
Siena, Alberto [2 ]
机构
[1] Univ Milan, Dept Social & Polit Sci, Milan, Italy
[2] Fondazione Bruno Kessler, Trento, Italy
[3] Univ Trento, Dept Math, Trento, Italy
来源
FRONTIERS IN BIG DATA | 2021年 / 3卷
关键词
cyber security; data analysis; security incidents statistics; methodological framework; data breaches;
D O I
10.3389/fdata.2020.521132
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing an adequate assessment of their cyber-security posture requires companies and organisations to collect information about threats from a wide range of sources. One of such sources is history, intended as the knowledge about past cyber-security incidents, their size, type of attacks, industry sector and so on. Ideally, having a large enough dataset of past security incidents, it would be possible to analyze it with automated tools and draw conclusions that may help in preventing future incidents. Unfortunately, it seems that there are only a few publicly available datasets of this kind that are of good quality. The paper reports our initial efforts in collecting all publicly available security incidents datasets, and building a single, large dataset that can be used to draw statistically significant observations. In order to argue about its statistical quality, we analyze the resulting combined dataset against the original ones. Additionally, we perform an analysis of the combined dataset and compare our results with the existing literature. Finally, we present our findings, discuss the limitations of the proposed approach, and point out interesting research directions.
引用
收藏
页数:13
相关论文
共 24 条
[1]  
Abbiati G., 2019, P 4 INT C INT THINGS P 4 INT C INT THINGS
[2]  
[Anonymous], 2018, Data Breach: Tax-Related Information for Taxpayers
[3]  
[Anonymous], 2018, ANN NUMB DAT BREACH
[4]  
[Anonymous], 2017, 2017 COST DAT BREACH
[5]  
[Anonymous], 2018, DAT BREACH INV REP
[6]  
Biancotti C, 2017, BANK ITALY OCCASIONA, DOI [10.2139/ssrn.3082195, DOI 10.2139/SSRN.3082195]
[7]  
Cappuzzo R., 2020, SIGMODPODS 20 SIGMODPODS 20, P3
[8]   Evaluating and improving semistructured merge [J].
Cavalcanti, Guilherme ;
Borba, Paulo ;
Accioly, Paola .
Proceedings of the ACM on Programming Languages, 2017, 1 (OOPSLA)
[9]   Hype and heavy tails: A closer look at data breaches [J].
Edwards, Benjamin ;
Hofmeyr, Steven ;
Forrest, Stephanie .
JOURNAL OF CYBERSECURITY, 2016, 2 (01) :3-14
[10]  
Halevy A., 2005, ACM Queue, V3, P50, DOI 10.1145/1103822.1103836