首页> 外文学位 >Predicting threat potential using cyber sensors.
【24h】

Predicting threat potential using cyber sensors.

机译:使用网络传感器预测潜在威胁。

获取原文
获取原文并翻译 | 示例

摘要

The proliferation of the Internet has created a culture of a connected society dependent upon technology for communication and information sharing needs. In this dissertation, we hypothesize that attackers are increasingly using electronic resources that are capable of leaving a digital footprint, such as social media services, e-mail, text messages, blogs, and websites for the communication, planning, and coordination of attacks. In its current form, however, traffic analysis is primarily concerned with using communications volume to extract intelligence information, but largely ignores the content of communications transmissions that is needed to meet the security challenges and demands of continually emerging threats.;In this dissertation, we make use of the enormous amount of electronic data potential and propose a model framework that is capable of predicting malicious intent based on mathematically sound principles in traffic flow theory. We define a set of objects, called threat agents, acting on a threat network and derive the set of values and conditions that allow us to predict the behavior of the network much in the same way a traffic flow model can be used to predict the behavior of a road system. This is accomplished using a set of variables created analogous to velocity, density, and flux in traffic flow theory that allow us to measure the level of congestion on which the threat prediction is based.;In this dissertation, we also apply the data mining techniques of classification and clustering analyses to derive not only the basis for our threat network but also to generate locational and categorical information. This contextual information provides a more complete picture of the potential threat that allows us to be in a position to better understand and respond to impending threats in a timely manner. We present experimental results obtained on a set of articles appearing on the Reuters newswire to predict threats defined within the context of the data set. Using a threat prediction profile produced from the model framework, we validate our test results by mapping the predicted threats to actual event occurrences contained within the data set itself with promising results.
机译:互联网的普及创造了一种依赖于通信和信息共享需求的技术的互联社会文化。在本文中,我们假设攻击者越来越多地使用能够留下数字足迹的电子资源,例如社交媒体服务,电子邮件,文本消息,博客和网站,以进行攻击的通信,计划和协调。然而,以目前的形式,流量分析主要涉及使用通信量来提取情报信息,但在很大程度上忽略了满足安全挑战和不断出现的威胁的需求所需要的通信传输内容。利用巨大的电子数据潜力,并提出一种模型框架,该模型框架能够基于交通流理论中的数学上合理的原理来预测恶意意图。我们定义了一组作用在威胁网络上的对象,称为威胁代理,并得出一组值和条件,这些值和条件使我们可以非常预测网络的行为,就像使用流量模型来预测行为一样道路系统。这是通过使用类似于交通流理论中的速度,密度和通量创建的一组变量来完成的,这些变量使我们能够测量威胁预测所基于的拥塞程度。在本文中,我们还应用了数据挖掘技术分类和聚类分析不仅可以得出我们威胁网络的基础,而且还可以生成位置和分类信息。这些上下文信息提供了对潜在威胁的更完整描述,使我们能够及时更好地理解和应对即将来临的威胁。我们提供从路透社新闻专栏中发表的一组文章中获得的实验结果,以预测在数据集范围内定义的威胁。使用从模型框架生成的威胁预测配置文件,我们通过将预测的威胁映射到数据集本身中包含的实际事件发生并验证结果的方式来验证测试结果。

著录项

  • 作者

    Thompson, Mark Anthony.;

  • 作者单位

    Louisiana Tech University.;

  • 授予单位 Louisiana Tech University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2013
  • 页码 139 p.
  • 总页数 139
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号