Security and Communication Networks

Data-Driven Cybersecurity


Publishing date
01 Aug 2019
Status
Published
Submission deadline
05 Apr 2019

Lead Editor

1Sungkyunkwan University, Seoul, Republic of Korea

2Penn State University, State College, USA

3St. Pölten University of Applied Sciences, Sankt Pölten, Austria

4CSIRO Data61, Queensland, Australia


Data-Driven Cybersecurity

Description

In traditional cybersecurity approaches, data are managed in an ad hoc manner and often manually handled by a few experienced security analysts. However, as an increasing number of cybersecurity threats continuously appear over time, such conventional treatments have encountered limitations in mitigating cybersecurity threats and reducing their risks due to the fact that numerous advanced attacks are created and spread very quickly throughout the Internet. To address this issue, we need to develop more flexible and efficient security mechanisms that can respond to threats and update security rules in order to mitigate them in a timely manner. To develop such security mechanisms, it is inherently required to analyze a massive amount of data generated from various applications and generate proper security rules/policies with minimal human intervention in an automated manner.

To accomplish this goal, researchers are starting to use tools like Artificial Intelligence (AI) and Machine Learning (ML). Many of newly emerging security solutions are already adopting more data-driven approaches. Security Information and Event Management (SIEM) systems are a good example of this trend.

This special issue solicits original contributions dealing with data-driven analysis methods and techniques for cybersecurity solutions. Practical and theoretical papers related to data-driven analysis in cybersecurity are welcome.

Potential topics include but are not limited to the following:

  • Data-driven cyber threat and incident analysis
  • Data-driven software testing
  • Data-driven threat anticipation
  • Data-driven security architecture
  • Data-driven security incident management or response
  • Cybersecurity data analytics and visualization
  • AI for cybersecurity

Articles

  • Special Issue
  • - Volume 2019
  • - Article ID 1901548
  • - Research Article

CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis

Mee Lan Han | Byung Il Kwak | Huy Kang Kim
  • Special Issue
  • - Volume 2019
  • - Article ID 3093809
  • - Research Article

Session-Based Webshell Detection Using Machine Learning in Web Logs

Yixin Wu | Yuqiang Sun | ... | Luping Liu
  • Special Issue
  • - Volume 2019
  • - Article ID 2317976
  • - Research Article

Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD

Dainius Čeponis | Nikolaj Goranin
  • Special Issue
  • - Volume 2019
  • - Article ID 8467081
  • - Research Article

Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs

Jiaye Pan | Yi Zhuang | Binglin Sun
  • Special Issue
  • - Volume 2019
  • - Article ID 3648671
  • - Research Article

A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms

Baek Kyung Song | Joon Soo Yoo | ... | Ji Won Yoon
  • Special Issue
  • - Volume 2019
  • - Article ID 6268476
  • - Research Article

Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis

Daegeon Kim | Huy Kang Kim
  • Special Issue
  • - Volume 2019
  • - Article ID 1982168
  • - Research Article

Power Grid Estimation Using Electric Network Frequency Signals

Woorim Bang | Ji Won Yoon
  • Special Issue
  • - Volume 2019
  • - Article ID 6716918
  • - Research Article

A Data-Driven Approach to Cyber Risk Assessment

Paolo Santini | Giuseppe Gottardi | ... | Franco Chiaraluce
  • Special Issue
  • - Volume 2019
  • - Article ID 8565397
  • - Research Article

Evaluating the Impact of Name Resolution Dependence on the DNS

Haiyan Xu | Zhaoxin Zhang | ... | Xin Ma
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.