All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Survey of Attack Projection, Prediction, and Forecasting in Cyber Security

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14610%2F19%3A00108866" target="_blank" >RIV/00216224:14610/19:00108866 - isvavai.cz</a>

  • Result on the web

    <a href="https://ieeexplore.ieee.org/document/8470942/" target="_blank" >https://ieeexplore.ieee.org/document/8470942/</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/COMST.2018.2871866" target="_blank" >10.1109/COMST.2018.2871866</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Survey of Attack Projection, Prediction, and Forecasting in Cyber Security

  • Original language description

    This paper provides a survey of prediction, and forecasting methods used in cyber security. Four main tasks are discussed first, attack projection and intention recognition, in which there is a need to predict the next move or the intentions of the attacker, intrusion prediction, in which there is a need to predict upcoming cyber attacks, and network security situation forecasting, in which we project cybersecurity situation in the whole network. Methods and approaches for addressing these tasks often share the theoretical background and are often complementary. In this survey, both methods based on discrete models, such as attack graphs, Bayesian networks, and Markov models, and continuous models, such as time series and grey models, are surveyed, compared, and contrasted. We further discuss machine learning and data mining approaches, that have gained a lot of attention recently and appears promising for such a constantly changing environment, which is cyber security. The survey also focuses on the practical usability of the methods and problems related to their evaluation.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    10200 - Computer and information sciences

Result continuities

  • Project

    <a href="/en/project/EF16_019%2F0000822" target="_blank" >EF16_019/0000822: CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2019

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    IEEE Communications Surveys & Tutorials

  • ISSN

    1553-877X

  • e-ISSN

  • Volume of the periodical

    21

  • Issue of the periodical within the volume

    1

  • Country of publishing house

    US - UNITED STATES

  • Number of pages

    21

  • Pages from-to

    640-660

  • UT code for WoS article

    000459730200024

  • EID of the result in the Scopus database

    2-s2.0-85054236310