Data Science for Cyber Security

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: closed (31 October 2022) | Viewed by 6978

Special Issue Editors


E-Mail Website
Guest Editor
Department of Informatics & Telecommunications, University of the Peloponnese, GR-22131 Tripoli, Greece
Interests: information management; distributed systems; digital libraries; databases; big data systems; cybersecurity; IoT
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Software and Database Systems (SoDa) Lab, Department of Informatics & Telecommunications, University of the Peloponnese, University Campus - Akadimaikou G.K. Vlachou Str., GR22131 Tripoli, Greece
Interests: data management; big data; anonymity & privacy; knowledge management; query evaluation

Special Issue Information

Dear Colleagues,

This issue is dedicated to the 1st International Workshop on Data Science for Cyber Security (DS4CS 2021), devoted to highlight the recent trends and progress made at the intersection of data science and cyber-security. Due to the COVID pandemic DS4CS 2021 will take place virtually, as is the case for the hosting conference on Cyber-Security and Resilience (IEEE-CSR 2021).

Over the years cyber-threats have increased in numbers and sophistication; adversaries now use a vast set of tools and tactics to attack their victims with their motivations ranging from intelligence collection to destruction or financial gain. Lately, the introduction of IoT devices on a number of applications, ranging from home automation to monitoring of critical infrastructures, has created an even more complicated cyber-defense landscape. The sheer number of IoT devices deployed globally, most of which are readily accessible and easily hacked, allows threat actors to use them as the cyber-weapon delivery system of choice in many today’s cyber-attacks, ranging from botnet-building for DDoS attacks, to malware spreading and spamming.

Staying on top of these evolving cyber-threats has become an increasingly difficult task that nowadays entails the collection, analysis, and leveraging of huge volumes of data and requires methodologies and techniques located at the intersection of statistics, data mining, machine learning, visualization and big data. Although the application of Data Science methodology to the Cyber Security domain is a relative new topic, it steadily gathers the interest of the research community as showcased by the utilization of data science techniques in a variety of cyber-defense facets that include proactive technologies (e.g., cyber-threat intelligence gathering and sharing), platform profiling (e.g., trust calculation and blacklisting), attack detection/mitigation (e.g., active network monitoring, situational awareness, and adaptable mitigation strategies), and others. This workshop aims to spotlight cutting-edge research in data science driven cyber-security in academia, business and government, as well as help in the alignment of these endeavors.

  • Big data-driven cyber-security (incl. analytics, management)
  • Machine and deep learning methods for cyber-security (incl. malware/phishing/botnet/ spam/intrusion/anomaly detection)
  • Visualization methods (incl. visual situation awareness, VR & AR visualization, real-time visualization)
  • AI-driven cybersecurity
  • Private information retrieval
  • Cyber-threat intelligence collection, identification and sharing at scale
  • Private/sensitive information protection
  • Machine-learning powered traffic analysis and attack modelling
  • Machine learning-based platform profiling and trust management
  • Advanced attack detection and mitigation

Prof. Dr. Christos Tryfonopoulos
Prof. Dr. Skiadopoulos Spiros
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • data science
  • cyber-security
  • big data
  • machine learning
  • artificial intelligence

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

17 pages, 399 KiB  
Article
An Automated Behaviour-Based Clustering of IoT Botnets
by Tolijan Trajanovski and Ning Zhang
Future Internet 2022, 14(1), 6; https://doi.org/10.3390/fi14010006 - 23 Dec 2021
Cited by 4 | Viewed by 2742
Abstract
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect. Despite the availability of solutions for automated analysis of IoT botnet samples, the identification of [...] Read more.
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect. Despite the availability of solutions for automated analysis of IoT botnet samples, the identification of new variants is still very challenging because the analysis results must be manually interpreted by malware analysts. To overcome this challenge, we propose an approach for automated behaviour-based clustering of IoT botnet samples, aimed to enable automatic identification of IoT botnet variants equipped with new capabilities. In the proposed approach, the behaviour of the IoT botnet samples is captured using a sandbox and represented as behaviour profiles describing the actions performed by the samples. The behaviour profiles are vectorised using TF-IDF and clustered using the DBSCAN algorithm. The proposed approach was evaluated using a collection of samples captured from IoT botnets propagating on the Internet. The evaluation shows that the proposed approach enables accurate automatic identification of IoT botnet variants equipped with new capabilities, which will help security researchers to investigate the new capabilities, and to apply the investigation findings for improving the solutions for detecting and preventing IoT botnet infections. Full article
(This article belongs to the Special Issue Data Science for Cyber Security)
Show Figures

Graphical abstract

Review

Jump to: Research

18 pages, 3104 KiB  
Review
Resilience in the Cyberworld: Definitions, Features and Models
by Elisabeth Vogel, Zoya Dyka, Dan Klann and Peter Langendörfer
Future Internet 2021, 13(11), 293; https://doi.org/10.3390/fi13110293 - 19 Nov 2021
Cited by 3 | Viewed by 2822
Abstract
Resilience is a feature that is gaining more and more attention in computer science and computer engineering. However, the definition of resilience for the cyber landscape, especially embedded systems, is not yet clear. This paper discusses definitions provided by different authors, on different [...] Read more.
Resilience is a feature that is gaining more and more attention in computer science and computer engineering. However, the definition of resilience for the cyber landscape, especially embedded systems, is not yet clear. This paper discusses definitions provided by different authors, on different years and with different application areas the field of computer science/computer engineering. We identify the core statements that are more or less common to the majority of the definitions, and based on this we give a holistic definition using attributes for (cyber-) resilience. In order to pave a way towards resilience engineering, we discuss a theoretical model of the life cycle of a (cyber-) resilient system that consists of key actions presented in the literature. We adapt this model for embedded (cyber-) resilient systems. Full article
(This article belongs to the Special Issue Data Science for Cyber Security)
Show Figures

Figure 1

Back to TopTop