Artificial intelligence tools for cyber attribution. (2018)
- Record Type:
- Book
- Title:
- Artificial intelligence tools for cyber attribution. (2018)
- Main Title:
- Artificial intelligence tools for cyber attribution
- Further Information:
- Note: Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef.
- Authors:
- Nunes, Eric
Shakarian, Paulo
Simari, Gerardo I
Ruef, Andrew - Contents:
- Intro; Acknowledgements; Contents; 1 Introduction; References; 2 Baseline Cyber Attribution Models; 2.1 Introduction; 2.2 Dataset; 2.2.1 DEFCON CTF; 2.2.2 DEFCON CTF Data; 2.2.3 Analysis of CTF Data; 2.3 Baseline Approaches; 2.4 Experimental Results; 2.4.1 Misclassified Samples; 2.4.2 Pruning; 2.5 Conclusions; References; 3 Argumentation-Based Cyber Attribution: The DeLP3E Model; 3.1 Introduction; 3.1.1 Application to the Cyber Attribution Problem; 3.1.2 Structure of the Chapter; 3.2 Technical Preliminaries; 3.2.1 Basic Language; 3.2.2 Environmental Model; 3.2.3 Analytical Model. 3.3 The DeLP3E Framework3.3.1 Warranting Scenarios; 3.3.2 Entailment in DeLP3E; 3.4 Consistency and Inconsistency in DeLP3E Programs; 3.5 Case Study: An Application in Cybersecurity; 3.5.1 Model for the Attribution Problem; 3.5.2 Applying Entailment to the Cyber Attribution Problem; 3.6 Conclusions; References; 4 Belief Revision in DeLP3E; 4.1 Introduction; 4.2 Basic Belief Revision; 4.2.1 EM-Based Belief Revision; 4.2.2 AM-Based Belief Revision; 4.2.2.1 Postulates for AM-Based Belief Revision; 4.2.2.2 AM-Based Revision Operators; 4.2.3 Annotation Function-Based Belief Revision. 4.2.3.1 Postulates for Revising the Annotation Function4.2.3.2 AF-Based Revision Operators; 4.3 Quantitative Belief Revision Operators; 4.3.1 Towards Quantitative Revision; 4.3.2 Two Building Blocks; 4.3.3 The Class QAFO; 4.3.4 Computational Complexity; 4.3.5 Warranting Formulas; 4.3.6 Outlook: Towards TractableIntro; Acknowledgements; Contents; 1 Introduction; References; 2 Baseline Cyber Attribution Models; 2.1 Introduction; 2.2 Dataset; 2.2.1 DEFCON CTF; 2.2.2 DEFCON CTF Data; 2.2.3 Analysis of CTF Data; 2.3 Baseline Approaches; 2.4 Experimental Results; 2.4.1 Misclassified Samples; 2.4.2 Pruning; 2.5 Conclusions; References; 3 Argumentation-Based Cyber Attribution: The DeLP3E Model; 3.1 Introduction; 3.1.1 Application to the Cyber Attribution Problem; 3.1.2 Structure of the Chapter; 3.2 Technical Preliminaries; 3.2.1 Basic Language; 3.2.2 Environmental Model; 3.2.3 Analytical Model. 3.3 The DeLP3E Framework3.3.1 Warranting Scenarios; 3.3.2 Entailment in DeLP3E; 3.4 Consistency and Inconsistency in DeLP3E Programs; 3.5 Case Study: An Application in Cybersecurity; 3.5.1 Model for the Attribution Problem; 3.5.2 Applying Entailment to the Cyber Attribution Problem; 3.6 Conclusions; References; 4 Belief Revision in DeLP3E; 4.1 Introduction; 4.2 Basic Belief Revision; 4.2.1 EM-Based Belief Revision; 4.2.2 AM-Based Belief Revision; 4.2.2.1 Postulates for AM-Based Belief Revision; 4.2.2.2 AM-Based Revision Operators; 4.2.3 Annotation Function-Based Belief Revision. 4.2.3.1 Postulates for Revising the Annotation Function4.2.3.2 AF-Based Revision Operators; 4.3 Quantitative Belief Revision Operators; 4.3.1 Towards Quantitative Revision; 4.3.2 Two Building Blocks; 4.3.3 The Class QAFO; 4.3.4 Computational Complexity; 4.3.5 Warranting Formulas; 4.3.6 Outlook: Towards Tractable Computations; 4.4 Conclusions and Future Work; References; 5 Applying Argumentation Models for Cyber Attribution; 5.1 Introduction; 5.2 Baseline Argumentation Model (BM); 5.3 Extended Baseline Model i (EB1); 5.4 Extended Baseline Model ii (EB2); 5.5 Conclusions; References. 6 Enhanced Data Collection for Cyber Attribution6.1 Introduction; 6.2 Goals and Design; 6.2.1 Changing Contestant Behavior; 6.2.2 Game Rules; 6.2.3 Infrastructure Design; 6.2.4 Motivating Attribution and Deception; 6.2.5 Validity of Data; 6.3 Conclusion; References; 7 Conclusion. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (viii, 91 pages), illustrations
- Subjects:
- 006.3
Computer science
Artificial intelligence
Computer security
COMPUTERS -- General
Artificial intelligence
Computer security
Computers -- Security -- General
Computer security
Data protection
Computers -- Intelligence (AI) & Semantics
Artificial intelligence
Electronic books - Languages:
- English
- ISBNs:
- 9783319737881
3319737880 - Related ISBNs:
- 9783319737874
3319737872 - Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (SpringerLink, viewed February 20, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.348093
- Ingest File:
- 01_302.xml