Clinton Daniel, T. Gill, A. Hevner, Matthew T. Mullarkey
{"title":"A Deep Neural Network Approach to Tracing Paths in Cybersecurity Investigations","authors":"Clinton Daniel, T. Gill, A. Hevner, Matthew T. Mullarkey","doi":"10.1109/ICDMW51313.2020.00070","DOIUrl":null,"url":null,"abstract":"Security Analysts (SAs) operating within Security Operation Centers (SOCs) conduct cybersecurity investigations on cyber events using methods which pave a measurable path. These paths serve as a source of evidence to study the transitions of the cognitive tasks performed by the SA throughout the investigation. Insight into these paths can support the observation and understanding of how to evaluate and measure the critical decisions made during an investigation such as when a SA transitions from analyzing event logs to observing threat intelligence. We propose a framework we call the Cyber Analysis Transition Framework which applies a quantitative approach for evaluating and measuring the transitions of the SA conducting cyber analysis methods. The novel approach for this framework includes the application of process mining and deep neural network output as a means for evaluating and measuring a SA's performance while conducting cybersecurity investigations.","PeriodicalId":426846,"journal":{"name":"2020 International Conference on Data Mining Workshops (ICDMW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Data Mining Workshops (ICDMW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDMW51313.2020.00070","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Security Analysts (SAs) operating within Security Operation Centers (SOCs) conduct cybersecurity investigations on cyber events using methods which pave a measurable path. These paths serve as a source of evidence to study the transitions of the cognitive tasks performed by the SA throughout the investigation. Insight into these paths can support the observation and understanding of how to evaluate and measure the critical decisions made during an investigation such as when a SA transitions from analyzing event logs to observing threat intelligence. We propose a framework we call the Cyber Analysis Transition Framework which applies a quantitative approach for evaluating and measuring the transitions of the SA conducting cyber analysis methods. The novel approach for this framework includes the application of process mining and deep neural network output as a means for evaluating and measuring a SA's performance while conducting cybersecurity investigations.