Affiliation:
1. Communications Department, Universitat Politècnica de València, 46022 Valencia, Spain
Abstract
Cyberattacks are increasing in number and diversity in nature daily, and the tendency for them is to escalate dramatically in the forseeable future, with critical infrastructures (CI) assets and networks not being an exception to this trend. As time goes by, cyberattacks are more complex than before and unknown until they spawn, being very difficult to detect and remediate. To be reactive against those cyberattacks, usually defined as zero-day attacks, cyber-security specialists known as threat hunters must be in organizations’ security departments. All the data generated by the organization’s users must be processed by those threat hunters (which are mainly benign and repetitive and follow predictable patterns) in short periods to detect unusual behaviors. The application of artificial intelligence, specifically machine learning (ML) techniques (for instance NLP, C-RNN-GAN, or GNN), can remarkably impact the real-time analysis of those data and help to discriminate between harmless data and malicious data, but not every technique is helpful in every circumstance; as a consequence, those specialists must know which techniques fit the best at every specific moment. The main goal of the present work is to design a distributed and scalable system for threat hunting based on ML, and with a special focus on critical infrastructure needs and characteristics.
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference63 articles.
1. (2021). PRAETORIAN. D3.1 Transitioning Risk Management. PRAETORIAN H2020 Project Deliverables, in press.
2. Cyber security meets artificial intelligence: A survey;Li;Front. Inf. Technol. Electron. Eng.,2018
3. Is prediction nothing more than multi-scale pattern completion of the future?;Falandays;Brain Res.,2021
4. Thinking ahead: The role and roots of prediction in language comprehension;Federmeier;Psychophysiology,2007
5. The role of anticipation in cognition;Riegler;Proceedings of the AIP Conference Proceedings,2001
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献