cyber intelligence decision support in the era of big...
TRANSCRIPT
![Page 1: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/1.jpg)
Z. MINCHEV, G. DUKOV, T. IVANOVA, K. MIHAYLOV,
D. BOYADZHIEV, P. MATEEV, M. BOJKOVA & N. DASKALOVA
SOFIA, BULGARIA ESGI 113 18.09. 2015
Final Report
![Page 2: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/2.jpg)
…
![Page 3: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/3.jpg)
![Page 4: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/4.jpg)
*Selected data from the Bulgarian Academy of Sciences Analysis for the WG on Cyber Security Strategy Preparation on behalf of the Council Ministries of the Republic of Bulgaria, July, 2015, Read more…
![Page 5: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/5.jpg)
![Page 6: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/6.jpg)
1 – E-Gov Service 2 – ISP 3 – Ext Cloud Services 4 – User 5 – Hacker 6 – Botnet
1 – E-Gov Service 2 – ISP 3 – Ext Cloud Services 4 – User 5 – Hacker 6 – Botnet
![Page 7: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/7.jpg)
1- User 2 - Hacker 3 – Cloud Environment 4 - ISP 5 – Home Automation Server 6 - Smart Devices
1- User 2 - Hacker 3 - Cloud Environment 4 - ISP 5 – Home Automation Server 6 - Smart Device
![Page 8: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/8.jpg)
1- Bank System 2 - Credit Cards Services 3 - User 4 - Hacker 5 - Mobile Comms
1- Bank System 2 - Credit Cards Services 3 - User 4 - Hacker 5 - Mobile Comms
![Page 9: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/9.jpg)
Object 1 – User Object 2 – Hacker Object 3 – Mobile Bank Service
![Page 10: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/10.jpg)
Object 1 – User Object 2 – Hacker - > Object 2 !? Object 3 – Mobile Bank Service
Minchev, 2011
![Page 11: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/11.jpg)
Minimize y
![Page 12: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/12.jpg)
X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45 X51 X52 X53 X54 Y
ObjFunc 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1
Variabl 20 0 0 0 0 0 0 0 0 0 0 70 0 0 40 0 0 30 0 40 0
Out1 1 1 0 0 0 0 0 0 1
Out2 0 0 0 0 0 0 0 0 0
Out3 0 0 1 1 1 0 0 0 0
Out4 0 0 0 0 0 1 0 0 1
Out5 0 0 0 0 0 0 1 1 1
In1 0 0 0 0 0 0 0 0 0
In2 1 0 1 0 0 0 1 0 1
In3 0 1 0 0 0 1 0 0 0
In4 0 0 0 1 0 0 0 1 1
In5 0 0 0 0 1 0 0 0 1
Out1 1 1 0 0 0 0 0 0 -1
Out2 0 0 0 0 0 0 0 0 0
Out3 0 0 1 1 1 0 0 0 0
Out4 0 0 0 0 0 1 0 0 -1
Out5 0 0 0 0 0 0 1 1 -1
In1 0 0 0 0 0 0 0 0 0
In2 1 0 1 0 0 0 1 0 -1
In3 0 1 0 0 0 1 0 0 0
In4 0 0 0 1 0 0 0 1 -1
In5 0 0 0 0 1 0 0 0 -1
Lower Bound 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Upper Bound 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100
![Page 13: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/13.jpg)
n=n1,…,nk, a=a1,…,ak
nj – total number of requests aj – number of harmful requests j=0,…,k, k – number of arcs in the graph
pj=aj/nj
Beta distribution with its multivariate Dirichlet generalization for multiple events assessing
a posteriori pj Be ((+aj), + (nj-aj))
Risk: P(A) = p a priori Be (, )
~
~
![Page 14: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/14.jpg)
2018 March, 2015
![Page 15: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/15.jpg)
![Page 16: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/16.jpg)
Obviously exploring nowadays cyber world for multiple cyber threats is a complex task, combining: (i) suitable model interpretation, (ii) optimization & (iii) validation (expert- & simulation- based). These three steps have to be adequately interpreted in the big data context, being rather specific, demanding and fast evolving.
The final objective is achieving a useful decision support and adequate cyber intelligence, concerning future threats/attacks landscape evolution meeting.
![Page 17: Cyber Intelligence Decision Support in the Era of Big Dataparallel.bas.bg/ESGI113/presentations/problem6_pr.pdf · X12 X13 X14 X15 X21 X23 X24 X25 X31 X32 X34 X35 X41 X42 X43 X45](https://reader034.vdocuments.us/reader034/viewer/2022050605/5facc710ff5550209f1eeaf0/html5/thumbnails/17.jpg)