Redirigiendo al acceso original de articulo en 16 segundos...
ARTÍCULO
TITULO

Threat Hunting Architecture Using a Machine Learning Approach for Critical Infrastructures Protection

Mario Aragonés Lozano    
Israel Pérez Llopis and Manuel Esteve Domingo    

Resumen

The number and the diversity in nature of daily cyber-attacks have increased in the last few years, and trends show that both will grow exponentially in the near future. Critical Infrastructures (CI) operators are not excluded from these issues; therefore, CIs? Security Departments must have their own group of IT specialists to prevent and respond to cyber-attacks. To introduce more challenges in the existing cyber security landscape, many attacks are unknown until they spawn, even a long time after their initial actions, posing increasing difficulties on their detection and remediation. To be reactive against those cyber-attacks, usually defined as zero-day attacks, organizations must have Threat Hunters at their security departments that must be aware of unusual behaviors and Modus Operandi. Threat Hunters must face vast amounts of data (mainly benign and repetitive, and following predictable patterns) in short periods to detect any anomaly, with the associated cognitive overwhelming. The application of Artificial Intelligence, specifically Machine Learning (ML) techniques, can remarkably impact the real-time analysis of those data. Not only that, but providing the specialists with useful visualizations can significantly increase the Threat Hunters? understanding of the issues that they are facing. Both of these can help to discriminate between harmless data and malicious data, alleviating analysts from the above-mentioned overload and providing means to enhance their Cyber Situational Awareness (CSA). This work aims to design a system architecture that helps Threat Hunters, using a Machine Learning approach and applying state-of-the-art visualization techniques in order to protect Critical Infrastructures based on a distributed, scalable and online configurable framework of interconnected modular components.

 Artículos similares

       
 
Emin Aktan, Ivan Bartoli, Branko Gli?ic and Carlo Rainieri    
This paper summarizes the lessons learned after several decades of exploring and applying Structural Health Monitoring (SHM) in operating bridge structures. The challenges in real-time imaging and processing of large amounts of sensor data at various ban... ver más
Revista: Infrastructures

 
Wadslin Frenelus, Hui Peng and Jingyu Zhang    
The stability of deep soft rock tunnels under seepage conditions is of particular concern. Aiming at thoroughly discussing seepage actions and their consequences on the support schemes of such structures, the host rocks of the Weilai Tunnel situated in t... ver más
Revista: Infrastructures

 
Melody R. Mukandi, Moses Basitere, Seteno K. O. Ntwampe, Mahomet Njoya, Boredi S. Chidi, Cynthia Dlangamandla and Ncumisa Mpongwana    
The poultry industry generates significant volumes of slaughterhouse wastewater, laden with numerous pollutants, thus requiring pretreatment prior to discharge. However, new technologies must be used to re-engineer the existing wastewater treatment equip... ver más
Revista: Water

 
Lucas de Lima Casseres dos Santos, Jean Bruno Melo Silva, Luisa Soares Neves, Natalia dos Santos Renato, Julia Moltó, Juan Antonio Conesa and Alisson Carraro Borges    
The scarcity of natural resources makes it essential to develop products that meet environmental requirements. This is also true for the water and wastewater treatment business, where even consolidated processes, such as coagulation and flocculation, mus... ver más
Revista: Water

 
Christoph Stach    
Currently, data are often referred to as the oil of the 21st century. This comparison is not only used to express that the resource data are just as important for the fourth industrial revolution as oil was for the technological revolution in the late 19... ver más
Revista: Future Internet