{"title":"网络攻击阶段的因果发现","authors":"W. G. Mueller, Alex Memory, Kyle Bartrem","doi":"10.1109/ICMLA.2019.00219","DOIUrl":null,"url":null,"abstract":"Causal discovery algorithms are increasingly being used to discover valid, novel, and significant causal relationships from large amounts of observational data. Cyberattacks are hypothesized to evolve according to the Cyber Kill Chain® which consists of a causal model describing the phases of a cyberattack. This paper introduces causal discovery to cybersecurity research and provides evidence of the kill chain with an extensive empirical assessment of two databases of real cyberattacks.","PeriodicalId":436714,"journal":{"name":"2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Causal Discovery of Cyber Attack Phases\",\"authors\":\"W. G. Mueller, Alex Memory, Kyle Bartrem\",\"doi\":\"10.1109/ICMLA.2019.00219\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Causal discovery algorithms are increasingly being used to discover valid, novel, and significant causal relationships from large amounts of observational data. Cyberattacks are hypothesized to evolve according to the Cyber Kill Chain® which consists of a causal model describing the phases of a cyberattack. This paper introduces causal discovery to cybersecurity research and provides evidence of the kill chain with an extensive empirical assessment of two databases of real cyberattacks.\",\"PeriodicalId\":436714,\"journal\":{\"name\":\"2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMLA.2019.00219\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMLA.2019.00219","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Causal discovery algorithms are increasingly being used to discover valid, novel, and significant causal relationships from large amounts of observational data. Cyberattacks are hypothesized to evolve according to the Cyber Kill Chain® which consists of a causal model describing the phases of a cyberattack. This paper introduces causal discovery to cybersecurity research and provides evidence of the kill chain with an extensive empirical assessment of two databases of real cyberattacks.