Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability

Author(s):  
Nikolaos Doukas ◽  
Peter Stavroulakis ◽  
Nikolaos Bardis
2020 ◽  
Vol 117 (20) ◽  
pp. 10762-10768
Author(s):  
Yang Yang ◽  
Wu Youyou ◽  
Brian Uzzi

Replicability tests of scientific papers show that the majority of papers fail replication. Moreover, failed papers circulate through the literature as quickly as replicating papers. This dynamic weakens the literature, raises research costs, and demonstrates the need for new approaches for estimating a study’s replicability. Here, we trained an artificial intelligence model to estimate a paper’s replicability using ground truth data on studies that had passed or failed manual replication tests, and then tested the model’s generalizability on an extensive set of out-of-sample studies. The model predicts replicability better than the base rate of reviewers and comparably as well as prediction markets, the best present-day method for predicting replicability. In out-of-sample tests on manually replicated papers from diverse disciplines and methods, the model had strong accuracy levels of 0.65 to 0.78. Exploring the reasons behind the model’s predictions, we found no evidence for bias based on topics, journals, disciplines, base rates of failure, persuasion words, or novelty words like “remarkable” or “unexpected.” We did find that the model’s accuracy is higher when trained on a paper’s text rather than its reported statistics and that n-grams, higher order word combinations that humans have difficulty processing, correlate with replication. We discuss how combining human and machine intelligence can raise confidence in research, provide research self-assessment techniques, and create methods that are scalable and efficient enough to review the ever-growing numbers of publications—a task that entails extensive human resources to accomplish with prediction markets and manual replication alone.


2021 ◽  
pp. 106-112
Author(s):  
O. РАNСНENKO

The article considers topical issues of cyber threat risk assessment. It contains an analysis of the Law “On Basic Principles for providing of Cyber Security of Ukraine”, the Cyber Security Strategy of Ukraine and other legislative acts for providing on cyber security. The main approaches to determining the assessment of cyber threats are considered. The best examples of foreign practice of cyber threat risk assessment are analyzed, the most effective national systems of their assessment are revealed. It is concluded that multi-level risk and threat assessment systems are most effective when the relevant analysis is conducted at both the national and regional and/or local levels.


Author(s):  
Stephen Moskal ◽  
Shanchieh Jay Yang ◽  
Michael E Kuhl

Existing research on cyber threat assessment focuses on analyzing the network vulnerabilities and producing possible attack graphs. Cyber attacks in real-world enterprise networks, however, vary significantly due to not only network and system configurations, but also the attacker’s strategies. This work proposes a cyber-based attacker behavior model (ABM) in conjunction with the Cyber Attack Scenario and Network Defense Simulator to model the interaction between the network and the attackers. The ABM leverages a knowledge-based design and factors in the capability, opportunity, intent, preference, and Cyber Attack Kill Chain integration to model various types of attackers. By varying the types of attackers and the network configurations, and simulating their interactions, we present a method to measure the overall network security against cyber attackers under different scenarios. Simulation results based on four attacker types on two network configurations are shown to demonstrate how different attacker behaviors may lead to different ways to penetrate a network, and how a single misconfiguration may impact network security.


Banking law ◽  
2021 ◽  
Vol 1 ◽  
pp. 35-46
Author(s):  
Svetlana S. Gorokhova ◽  

The article examines the growing risks and security threats faced by the financial sector. This problem is currently most relevant, as the increased demand for security in the banking sector encourages the development and introduction of new technologies (including machine learning and artificial intelligence), while at the same time creating new vulnerable areas and related problems.


2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Vinay Arora ◽  
Rohan Singh Leekha ◽  
Kyungroul Lee ◽  
Aman Kataria

An effective machine learning implementation means that artificial intelligence has tremendous potential to help and automate financial threat assessment for commercial firms and credit agencies. The scope of this study is to build a predictive framework to help the credit bureau by modelling/assessing the credit card delinquency risk. Machine learning enables risk assessment by predicting deception in large imbalanced data by classifying the transaction as normal or fraudster. In case of fraud transaction, an alert can be sent to the related financial organization that can suspend the release of payment for particular transaction. Of all the machine learning models such as RUSBoost, decision tree, logistic regression, multilayer perceptron, K-nearest neighbor, random forest, and support vector machine, the overall predictive performance of customized RUSBoost is the most impressive. The evaluation metrics used in the experimentation are sensitivity, specificity, precision, F scores, and area under receiver operating characteristic and precision recall curves. Datasets used for training and testing of the models have been taken from kaggle.com.


Author(s):  
Yang Li ◽  
Yang Zheng ◽  
Bernhard Morys ◽  
Shuyue Pan ◽  
Jianqiang Wang ◽  
...  

2020 ◽  
Vol 3 (2) ◽  
pp. 7
Author(s):  

On August 20th, 2020, the Canadian Association for Security and Intelligence Studies (CASIS) Vancouver hosted its fourth digital roundtable event of the year, The Protective Power of Behavioural Threat Assessment (& Management) (BTAM). The presentation was conducted by guest speaker Andrea Ringrose, Director of Campus Public Safety at Simon Fraser University, who is also on the Board of Directors at Canadian Association of Threat Assessment Professionals. Ringrose’s presentation gave an overview on behavioural threat assessment and management, and how public safety and caring for persons of concern are interconnected when assessing threats and risks. Subsequently, Ringrose answered questions submitted by the audience, which focused on the assessment of different offender types, the handling bias during the BTAM process, the role of artificial intelligence, and the possibility of echo chambers accelerating behaviour. APA Citation CASIS Vancouver. (2020). The protective power of behavioural threat assessment (& management) (BTAM). The Journal of Intelligence, Conflict, and Warfare, 3(2), 77-83. https://journals.lib.sfu.ca/index.php/jicw/article/view/2409/1816.


Sign in / Sign up

Export Citation Format

Share Document