Intelligence graphs for threat intelligence and security policy validation of cyber systems

While the recent advances in Data Science and Machine Learning attract lots of attention in Cyber Security because of their promise for effective security analytics, Vulnerability Analysis, Risk Assessment and Security Policy Validation remain slightly aside. This is mainly due to the relatively slo...

Full description

Bibliographic Details
Main Authors: Vassilev, Vassil, Sowinski-Mydlarz, Viktor, Gasiorowski, Pawel, Ouazzane, Karim, Phipps, Anthony
Format: Conference or Workshop Item
Language:English
Published: 2020
Subjects:
Online Access:https://repository.londonmet.ac.uk/5375/1/ConferencePaper.pdf
_version_ 1825625425978589184
author Vassilev, Vassil
Sowinski-Mydlarz, Viktor
Gasiorowski, Pawel
Ouazzane, Karim
Phipps, Anthony
author_facet Vassilev, Vassil
Sowinski-Mydlarz, Viktor
Gasiorowski, Pawel
Ouazzane, Karim
Phipps, Anthony
author_sort Vassilev, Vassil
collection LMU
description While the recent advances in Data Science and Machine Learning attract lots of attention in Cyber Security because of their promise for effective security analytics, Vulnerability Analysis, Risk Assessment and Security Policy Validation remain slightly aside. This is mainly due to the relatively slow progress in the theoretical formulation and the technologi-cal foundation of the cyber security concepts such as logical vulnerability, threats and risks. In this article we are proposing a framework for logical analysis, threat intelligence and validation of security policies in cyber systems. It is based on multi-level model, consisting of ontology of situations and actions under security threats, security policies governing the security-related activities, and graph of the transactions. The framework is validated using a set of scenarios describing the most common security threats in digital banking and a proto-type of an event-driven engine for navigation through the intelligence graphs has been im-plemented. Although the framework was developed specifically for application in digital banking, the authors believe that it has much wider applicability to security policy analysis, threat intelligence and security by design of cyber systems for financial, commercial and business operations.
first_indexed 2024-07-09T03:59:26Z
format Conference or Workshop Item
id oai:repository.londonmet.ac.uk:5375
institution London Metropolitan University
language English
last_indexed 2024-07-09T03:59:26Z
publishDate 2020
record_format eprints
spelling oai:repository.londonmet.ac.uk:53752022-11-11T09:33:55Z https://repository.londonmet.ac.uk/5375/ Intelligence graphs for threat intelligence and security policy validation of cyber systems Vassilev, Vassil Sowinski-Mydlarz, Viktor Gasiorowski, Pawel Ouazzane, Karim Phipps, Anthony 000 Computer science, information & general works While the recent advances in Data Science and Machine Learning attract lots of attention in Cyber Security because of their promise for effective security analytics, Vulnerability Analysis, Risk Assessment and Security Policy Validation remain slightly aside. This is mainly due to the relatively slow progress in the theoretical formulation and the technologi-cal foundation of the cyber security concepts such as logical vulnerability, threats and risks. In this article we are proposing a framework for logical analysis, threat intelligence and validation of security policies in cyber systems. It is based on multi-level model, consisting of ontology of situations and actions under security threats, security policies governing the security-related activities, and graph of the transactions. The framework is validated using a set of scenarios describing the most common security threats in digital banking and a proto-type of an event-driven engine for navigation through the intelligence graphs has been im-plemented. Although the framework was developed specifically for application in digital banking, the authors believe that it has much wider applicability to security policy analysis, threat intelligence and security by design of cyber systems for financial, commercial and business operations. 2020-02-08 Conference or Workshop Item PeerReviewed text en https://repository.londonmet.ac.uk/5375/1/ConferencePaper.pdf Vassilev, Vassil, Sowinski-Mydlarz, Viktor, Gasiorowski, Pawel, Ouazzane, Karim and Phipps, Anthony (2020) Intelligence graphs for threat intelligence and security policy validation of cyber systems. In: International Conference Artificial Intelligence and Applications ICAIA2020, 7-8 February 2020, Janakpuri, New Delhi, India.
spellingShingle 000 Computer science, information & general works
Vassilev, Vassil
Sowinski-Mydlarz, Viktor
Gasiorowski, Pawel
Ouazzane, Karim
Phipps, Anthony
Intelligence graphs for threat intelligence and security policy validation of cyber systems
title Intelligence graphs for threat intelligence and security policy validation of cyber systems
title_full Intelligence graphs for threat intelligence and security policy validation of cyber systems
title_fullStr Intelligence graphs for threat intelligence and security policy validation of cyber systems
title_full_unstemmed Intelligence graphs for threat intelligence and security policy validation of cyber systems
title_short Intelligence graphs for threat intelligence and security policy validation of cyber systems
title_sort intelligence graphs for threat intelligence and security policy validation of cyber systems
topic 000 Computer science, information & general works
url https://repository.londonmet.ac.uk/5375/1/ConferencePaper.pdf
work_keys_str_mv AT vassilevvassil intelligencegraphsforthreatintelligenceandsecuritypolicyvalidationofcybersystems
AT sowinskimydlarzviktor intelligencegraphsforthreatintelligenceandsecuritypolicyvalidationofcybersystems
AT gasiorowskipawel intelligencegraphsforthreatintelligenceandsecuritypolicyvalidationofcybersystems
AT ouazzanekarim intelligencegraphsforthreatintelligenceandsecuritypolicyvalidationofcybersystems
AT phippsanthony intelligencegraphsforthreatintelligenceandsecuritypolicyvalidationofcybersystems