{"title":"A Survey of Anomaly and Automation from a Cybersecurity Perspective","authors":"Michael Donevski, T. Zia","doi":"10.1109/GLOCOMW.2018.8644456","DOIUrl":null,"url":null,"abstract":"As the technological advances mature towards widespread adoption of Internet of Things (IoT) and Cyber Physical Systems (CPS), there come new security challenges, vulnerabilities, threats and attacks. Countering these security challenges require advance detection, prevention and defence techniques backed by automation and machine learning. This survey paper defines the cybersecurity preliminaries and stimulates questions to use machine learning and automation to counter cybersecurity challenges, many of those are unknown. The paper examines the literature and outlines research undertaken in the cybersecurity domain combating unknown or previously not seen cyber-attacks with focus on autonomous management of anomalies.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Globecom Workshops (GC Wkshps)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOMW.2018.8644456","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
As the technological advances mature towards widespread adoption of Internet of Things (IoT) and Cyber Physical Systems (CPS), there come new security challenges, vulnerabilities, threats and attacks. Countering these security challenges require advance detection, prevention and defence techniques backed by automation and machine learning. This survey paper defines the cybersecurity preliminaries and stimulates questions to use machine learning and automation to counter cybersecurity challenges, many of those are unknown. The paper examines the literature and outlines research undertaken in the cybersecurity domain combating unknown or previously not seen cyber-attacks with focus on autonomous management of anomalies.