Toward situational awareness in threat detection. A survey

The pervasiveness of the Internet did not come without security risk. The current threat landscape is characterized by the rise of sophisticated cyber attacks, which target user devices and corporate infrastructure. To tackle the risk of compromise, data‐driven detection strategies have become incre...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:WIREs. Forensic science 2022-07, Vol.4 (4), p.e1448-n/a
Hauptverfasser: Rendall, Kieran, Mylonas, Alexios, Vidalis, Stilianos
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page n/a
container_issue 4
container_start_page e1448
container_title WIREs. Forensic science
container_volume 4
creator Rendall, Kieran
Mylonas, Alexios
Vidalis, Stilianos
description The pervasiveness of the Internet did not come without security risk. The current threat landscape is characterized by the rise of sophisticated cyber attacks, which target user devices and corporate infrastructure. To tackle the risk of compromise, data‐driven detection strategies have become increasingly mainstream. The relevant literature includes many works that leverage open‐source datasets, supervised learning or, less commonly, unsupervised learning. However, advanced network attacks' spatial and temporal characteristics prove standalone threat detection systems inadequate, especially for detecting a multi‐stage attack and often stealthy techniques. Moreover, attackers have been demonstrating adversarial effects that are caused by deception and contaminating data‐driven methods with adversarial learning. For these reasons, recent research in threat detection is moving away from commonly, and often obsolete, datasets as well as adopting more multi‐layered decision strategies. As such, this article provides a comprehensive review of decision strategies. We also examine their ability to support cyber situational awareness (CSA), providing to security analysts CSA properties such as situation assessment and system refinement. This article is categorized under: Digital and Multimedia Science > Cyber Threat Intelligence Graphical shows the radial cycle of processes to achieve CSA in threat detection.
doi_str_mv 10.1002/wfs2.1448
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2688937508</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2688937508</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1878-4ee5b4282ad3deec6eedee87022939bb18da8022bca67be435a8dcba313f22043</originalsourceid><addsrcrecordid>eNp1kEtLw0AUhQdRsNQu_AcDrlwknVeSG3elWBUKLqy4HCbJDabEpM4khvx7J8aFG1fnPr57uBxCrjkLOWNiPZROhFwpOCMLESUySFUM53_qS7Jy7sg8y5VIIliQu0M7GFtQV3W96aq2MTU1foINOkerhnbvFk1HC-wwn_Yh3VDX2y8cr8hFaWqHq19dktfd_WH7GOyfH562m32Qc0ggUIhRpgQIU8gCMY8RvUDChEhlmmUcCgO-yXITJxkqGRko8sxILkshmJJLcjP7nmz72aPr9LHtrX_UaREDpDKJGHjqdqZy2zpnsdQnW30YO2rO9JSOntLRUzqeXc_sUNU4_g_qt92L-Ln4Bm8KZig</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2688937508</pqid></control><display><type>article</type><title>Toward situational awareness in threat detection. A survey</title><source>Access via Wiley Online Library</source><creator>Rendall, Kieran ; Mylonas, Alexios ; Vidalis, Stilianos</creator><creatorcontrib>Rendall, Kieran ; Mylonas, Alexios ; Vidalis, Stilianos</creatorcontrib><description>The pervasiveness of the Internet did not come without security risk. The current threat landscape is characterized by the rise of sophisticated cyber attacks, which target user devices and corporate infrastructure. To tackle the risk of compromise, data‐driven detection strategies have become increasingly mainstream. The relevant literature includes many works that leverage open‐source datasets, supervised learning or, less commonly, unsupervised learning. However, advanced network attacks' spatial and temporal characteristics prove standalone threat detection systems inadequate, especially for detecting a multi‐stage attack and often stealthy techniques. Moreover, attackers have been demonstrating adversarial effects that are caused by deception and contaminating data‐driven methods with adversarial learning. For these reasons, recent research in threat detection is moving away from commonly, and often obsolete, datasets as well as adopting more multi‐layered decision strategies. As such, this article provides a comprehensive review of decision strategies. We also examine their ability to support cyber situational awareness (CSA), providing to security analysts CSA properties such as situation assessment and system refinement. This article is categorized under: Digital and Multimedia Science &gt; Cyber Threat Intelligence Graphical shows the radial cycle of processes to achieve CSA in threat detection.</description><identifier>ISSN: 2573-9468</identifier><identifier>EISSN: 2573-9468</identifier><identifier>DOI: 10.1002/wfs2.1448</identifier><language>eng</language><publisher>Hoboken, USA: John Wiley &amp; Sons, Inc</publisher><subject>cyber situational awareness ; Deception ; ensemble ; Infrastructure ; Intelligence ; intrusion detection ; Learning ; machine learning ; Multimedia ; multi‐layered ; Threats</subject><ispartof>WIREs. Forensic science, 2022-07, Vol.4 (4), p.e1448-n/a</ispartof><rights>2021 Wiley Periodicals LLC.</rights><rights>2022 Wiley Periodicals LLC.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c1878-4ee5b4282ad3deec6eedee87022939bb18da8022bca67be435a8dcba313f22043</cites><orcidid>0000-0002-1195-7962 ; 0000-0001-8819-5831</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fwfs2.1448$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fwfs2.1448$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27924,27925,45574,45575</link.rule.ids></links><search><creatorcontrib>Rendall, Kieran</creatorcontrib><creatorcontrib>Mylonas, Alexios</creatorcontrib><creatorcontrib>Vidalis, Stilianos</creatorcontrib><title>Toward situational awareness in threat detection. A survey</title><title>WIREs. Forensic science</title><description>The pervasiveness of the Internet did not come without security risk. The current threat landscape is characterized by the rise of sophisticated cyber attacks, which target user devices and corporate infrastructure. To tackle the risk of compromise, data‐driven detection strategies have become increasingly mainstream. The relevant literature includes many works that leverage open‐source datasets, supervised learning or, less commonly, unsupervised learning. However, advanced network attacks' spatial and temporal characteristics prove standalone threat detection systems inadequate, especially for detecting a multi‐stage attack and often stealthy techniques. Moreover, attackers have been demonstrating adversarial effects that are caused by deception and contaminating data‐driven methods with adversarial learning. For these reasons, recent research in threat detection is moving away from commonly, and often obsolete, datasets as well as adopting more multi‐layered decision strategies. As such, this article provides a comprehensive review of decision strategies. We also examine their ability to support cyber situational awareness (CSA), providing to security analysts CSA properties such as situation assessment and system refinement. This article is categorized under: Digital and Multimedia Science &gt; Cyber Threat Intelligence Graphical shows the radial cycle of processes to achieve CSA in threat detection.</description><subject>cyber situational awareness</subject><subject>Deception</subject><subject>ensemble</subject><subject>Infrastructure</subject><subject>Intelligence</subject><subject>intrusion detection</subject><subject>Learning</subject><subject>machine learning</subject><subject>Multimedia</subject><subject>multi‐layered</subject><subject>Threats</subject><issn>2573-9468</issn><issn>2573-9468</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp1kEtLw0AUhQdRsNQu_AcDrlwknVeSG3elWBUKLqy4HCbJDabEpM4khvx7J8aFG1fnPr57uBxCrjkLOWNiPZROhFwpOCMLESUySFUM53_qS7Jy7sg8y5VIIliQu0M7GFtQV3W96aq2MTU1foINOkerhnbvFk1HC-wwn_Yh3VDX2y8cr8hFaWqHq19dktfd_WH7GOyfH562m32Qc0ggUIhRpgQIU8gCMY8RvUDChEhlmmUcCgO-yXITJxkqGRko8sxILkshmJJLcjP7nmz72aPr9LHtrX_UaREDpDKJGHjqdqZy2zpnsdQnW30YO2rO9JSOntLRUzqeXc_sUNU4_g_qt92L-Ln4Bm8KZig</recordid><startdate>202207</startdate><enddate>202207</enddate><creator>Rendall, Kieran</creator><creator>Mylonas, Alexios</creator><creator>Vidalis, Stilianos</creator><general>John Wiley &amp; Sons, Inc</general><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8BJ</scope><scope>FQK</scope><scope>JBE</scope><orcidid>https://orcid.org/0000-0002-1195-7962</orcidid><orcidid>https://orcid.org/0000-0001-8819-5831</orcidid></search><sort><creationdate>202207</creationdate><title>Toward situational awareness in threat detection. A survey</title><author>Rendall, Kieran ; Mylonas, Alexios ; Vidalis, Stilianos</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1878-4ee5b4282ad3deec6eedee87022939bb18da8022bca67be435a8dcba313f22043</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>cyber situational awareness</topic><topic>Deception</topic><topic>ensemble</topic><topic>Infrastructure</topic><topic>Intelligence</topic><topic>intrusion detection</topic><topic>Learning</topic><topic>machine learning</topic><topic>Multimedia</topic><topic>multi‐layered</topic><topic>Threats</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rendall, Kieran</creatorcontrib><creatorcontrib>Mylonas, Alexios</creatorcontrib><creatorcontrib>Vidalis, Stilianos</creatorcontrib><collection>CrossRef</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>International Bibliography of the Social Sciences</collection><collection>International Bibliography of the Social Sciences</collection><jtitle>WIREs. Forensic science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rendall, Kieran</au><au>Mylonas, Alexios</au><au>Vidalis, Stilianos</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Toward situational awareness in threat detection. A survey</atitle><jtitle>WIREs. Forensic science</jtitle><date>2022-07</date><risdate>2022</risdate><volume>4</volume><issue>4</issue><spage>e1448</spage><epage>n/a</epage><pages>e1448-n/a</pages><issn>2573-9468</issn><eissn>2573-9468</eissn><abstract>The pervasiveness of the Internet did not come without security risk. The current threat landscape is characterized by the rise of sophisticated cyber attacks, which target user devices and corporate infrastructure. To tackle the risk of compromise, data‐driven detection strategies have become increasingly mainstream. The relevant literature includes many works that leverage open‐source datasets, supervised learning or, less commonly, unsupervised learning. However, advanced network attacks' spatial and temporal characteristics prove standalone threat detection systems inadequate, especially for detecting a multi‐stage attack and often stealthy techniques. Moreover, attackers have been demonstrating adversarial effects that are caused by deception and contaminating data‐driven methods with adversarial learning. For these reasons, recent research in threat detection is moving away from commonly, and often obsolete, datasets as well as adopting more multi‐layered decision strategies. As such, this article provides a comprehensive review of decision strategies. We also examine their ability to support cyber situational awareness (CSA), providing to security analysts CSA properties such as situation assessment and system refinement. This article is categorized under: Digital and Multimedia Science &gt; Cyber Threat Intelligence Graphical shows the radial cycle of processes to achieve CSA in threat detection.</abstract><cop>Hoboken, USA</cop><pub>John Wiley &amp; Sons, Inc</pub><doi>10.1002/wfs2.1448</doi><tpages>31</tpages><orcidid>https://orcid.org/0000-0002-1195-7962</orcidid><orcidid>https://orcid.org/0000-0001-8819-5831</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 2573-9468
ispartof WIREs. Forensic science, 2022-07, Vol.4 (4), p.e1448-n/a
issn 2573-9468
2573-9468
language eng
recordid cdi_proquest_journals_2688937508
source Access via Wiley Online Library
subjects cyber situational awareness
Deception
ensemble
Infrastructure
Intelligence
intrusion detection
Learning
machine learning
Multimedia
multi‐layered
Threats
title Toward situational awareness in threat detection. A survey
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T06%3A06%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Toward%20situational%20awareness%20in%20threat%20detection.%20A%20survey&rft.jtitle=WIREs.%20Forensic%20science&rft.au=Rendall,%20Kieran&rft.date=2022-07&rft.volume=4&rft.issue=4&rft.spage=e1448&rft.epage=n/a&rft.pages=e1448-n/a&rft.issn=2573-9468&rft.eissn=2573-9468&rft_id=info:doi/10.1002/wfs2.1448&rft_dat=%3Cproquest_cross%3E2688937508%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2688937508&rft_id=info:pmid/&rfr_iscdi=true