Intelligence graphs for threat intelligence and security policy validation of cyber systems
While the recent advances in Data Science and Machine Learning attract lots of attention in Cyber Security because of their promise for effective security analytics, Vulnerability Analysis, Risk Assessment and Security Policy Validation remain slightly aside. This is mainly due to the relatively slo...
Main Authors: | , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://repository.londonmet.ac.uk/5375/1/ConferencePaper.pdf |
_version_ | 1825625425978589184 |
---|---|
author | Vassilev, Vassil Sowinski-Mydlarz, Viktor Gasiorowski, Pawel Ouazzane, Karim Phipps, Anthony |
author_facet | Vassilev, Vassil Sowinski-Mydlarz, Viktor Gasiorowski, Pawel Ouazzane, Karim Phipps, Anthony |
author_sort | Vassilev, Vassil |
collection | LMU |
description | While the recent advances in Data Science and Machine Learning attract lots of attention in Cyber Security because of their promise for effective security analytics, Vulnerability Analysis, Risk Assessment and Security Policy Validation remain slightly aside. This is mainly due to the relatively slow progress in the theoretical formulation and the technologi-cal foundation of the cyber security concepts such as logical vulnerability, threats and risks. In this article we are proposing a framework for logical analysis, threat intelligence and validation of security policies in cyber systems. It is based on multi-level model, consisting of ontology of situations and actions under security threats, security policies governing the security-related activities, and graph of the transactions. The framework is validated using a set of scenarios describing the most common security threats in digital banking and a proto-type of an event-driven engine for navigation through the intelligence graphs has been im-plemented. Although the framework was developed specifically for application in digital banking, the authors believe that it has much wider applicability to security policy analysis, threat intelligence and security by design of cyber systems for financial, commercial and business operations. |
first_indexed | 2024-07-09T03:59:26Z |
format | Conference or Workshop Item |
id | oai:repository.londonmet.ac.uk:5375 |
institution | London Metropolitan University |
language | English |
last_indexed | 2024-07-09T03:59:26Z |
publishDate | 2020 |
record_format | eprints |
spelling | oai:repository.londonmet.ac.uk:53752022-11-11T09:33:55Z https://repository.londonmet.ac.uk/5375/ Intelligence graphs for threat intelligence and security policy validation of cyber systems Vassilev, Vassil Sowinski-Mydlarz, Viktor Gasiorowski, Pawel Ouazzane, Karim Phipps, Anthony 000 Computer science, information & general works While the recent advances in Data Science and Machine Learning attract lots of attention in Cyber Security because of their promise for effective security analytics, Vulnerability Analysis, Risk Assessment and Security Policy Validation remain slightly aside. This is mainly due to the relatively slow progress in the theoretical formulation and the technologi-cal foundation of the cyber security concepts such as logical vulnerability, threats and risks. In this article we are proposing a framework for logical analysis, threat intelligence and validation of security policies in cyber systems. It is based on multi-level model, consisting of ontology of situations and actions under security threats, security policies governing the security-related activities, and graph of the transactions. The framework is validated using a set of scenarios describing the most common security threats in digital banking and a proto-type of an event-driven engine for navigation through the intelligence graphs has been im-plemented. Although the framework was developed specifically for application in digital banking, the authors believe that it has much wider applicability to security policy analysis, threat intelligence and security by design of cyber systems for financial, commercial and business operations. 2020-02-08 Conference or Workshop Item PeerReviewed text en https://repository.londonmet.ac.uk/5375/1/ConferencePaper.pdf Vassilev, Vassil, Sowinski-Mydlarz, Viktor, Gasiorowski, Pawel, Ouazzane, Karim and Phipps, Anthony (2020) Intelligence graphs for threat intelligence and security policy validation of cyber systems. In: International Conference Artificial Intelligence and Applications ICAIA2020, 7-8 February 2020, Janakpuri, New Delhi, India. |
spellingShingle | 000 Computer science, information & general works Vassilev, Vassil Sowinski-Mydlarz, Viktor Gasiorowski, Pawel Ouazzane, Karim Phipps, Anthony Intelligence graphs for threat intelligence and security policy validation of cyber systems |
title | Intelligence graphs for threat intelligence and security policy validation of cyber systems |
title_full | Intelligence graphs for threat intelligence and security policy validation of cyber systems |
title_fullStr | Intelligence graphs for threat intelligence and security policy validation of cyber systems |
title_full_unstemmed | Intelligence graphs for threat intelligence and security policy validation of cyber systems |
title_short | Intelligence graphs for threat intelligence and security policy validation of cyber systems |
title_sort | intelligence graphs for threat intelligence and security policy validation of cyber systems |
topic | 000 Computer science, information & general works |
url | https://repository.londonmet.ac.uk/5375/1/ConferencePaper.pdf |
work_keys_str_mv | AT vassilevvassil intelligencegraphsforthreatintelligenceandsecuritypolicyvalidationofcybersystems AT sowinskimydlarzviktor intelligencegraphsforthreatintelligenceandsecuritypolicyvalidationofcybersystems AT gasiorowskipawel intelligencegraphsforthreatintelligenceandsecuritypolicyvalidationofcybersystems AT ouazzanekarim intelligencegraphsforthreatintelligenceandsecuritypolicyvalidationofcybersystems AT phippsanthony intelligencegraphsforthreatintelligenceandsecuritypolicyvalidationofcybersystems |