Predicting cybersecurity incidents using machine learning algorithms: A case study of Korean smes
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mohasseb, A. | - |
dc.contributor.author | Aziz, B. | - |
dc.contributor.author | Jung, J. | - |
dc.contributor.author | Lee, Julak | - |
dc.date.accessioned | 2023-03-08T15:44:11Z | - |
dc.date.available | 2023-03-08T15:44:11Z | - |
dc.date.issued | 2019 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/63795 | - |
dc.description.abstract | The increasing amount and complexity of cyber security attacks in recent years have made text analysis and data-mining based techniques an important factor in detecting security threats. However, despite the popularity of text and other data mining techniques, the cyber security community has remained somehow reluctant in adopting an open approach to security-related data. In this paper, we analyze a dataset that has been collected from five Small and Medium companies in South Korea, this dataset represents cyber security incidents and response actions. We investigate how the data representing different incidents collected from multiple companies can help improve the classification accuracy and help the classifiers in distinguishing between different types of incidents. A model has been developed using text mining methods, such as n-gram, bag-of-words and machine learning algorithms for the classification of incidents and their response actions. Experimental results have demonstrated good performance of the classifiers for the prediction of different types of response and malware. © 2019 by SCITEPRESS - Science and Technology Publications, Lda. | - |
dc.format.extent | 8 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | SciTePress | - |
dc.title | Predicting cybersecurity incidents using machine learning algorithms: A case study of Korean smes | - |
dc.type | Article | - |
dc.identifier.doi | 10.5220/0007309302300237 | - |
dc.identifier.bibliographicCitation | ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy, pp 230 - 237 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85064630992 | - |
dc.citation.endPage | 237 | - |
dc.citation.startPage | 230 | - |
dc.citation.title | ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy | - |
dc.type.docType | Conference Paper | - |
dc.subject.keywordAuthor | Cybersecurity | - |
dc.subject.keywordAuthor | Machine Learning | - |
dc.subject.keywordAuthor | Malicious Code | - |
dc.subject.keywordAuthor | Malware | - |
dc.subject.keywordAuthor | Text Mining | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.