Skip to main content

Evaluating the Quantity of Incident-Related Information in an Open Cyber Security Dataset

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 373))

Abstract

Data-driven security has become essential in many organisations in their attempt to tackle Cyber security incidents. However, whilst the dominant approach to data-driven security remains through the mining of private and internal data, there is an increasing trend towards more open data through the sharing of Cyber security information and experience over public and community platforms. However, some questions remain over the quality and quantity of such open data. In this paper, we present the results of a recent case study that considers how feasible it is to answer a common question in Cyber security incident investigations, namely that “in an incident, who did what to which asset or victim, and with what result and impact”, for one such open Cyber security database.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Akkuzu, G., Aziz, B., et al.: Feature analysis on the containment time for cyber security incidents. In: 2018 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), pp. 262–269. IEEE (2018)

    Google Scholar 

  2. Aziz, B.: Towards open data-driven evaluation of access control policies. Comput. Stan. Interfaces 56, 13–26 (2018)

    Article  Google Scholar 

  3. Cano, L.A.: A modern approach to security: Using systems engineering and data-driven decision-making. In: 2016 IEEE International Carnahan Conference on Security Technology (ICCST), pp. 1–5, October 2016

    Google Scholar 

  4. Center for Applied Internet Data Analysis: CAIDA Data. http://www.caida.org/data/overview/. Accessed 14 Aug 2017

  5. CERT Coordination Center: CERT Vulnerability Notes Database. http://www.kb.cert.org/vuls. Accessed 14 Aug 2017

  6. Cordero, C.G., Vasilomanolakis, E., Milanov, N., Koch, C., Hausheer, D., Mühlhäuser, M.: Id2t: a diy dataset creation toolkit for intrusion detection systems. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 739–740. IEEE (2015)

    Google Scholar 

  7. Dandurand, L., Serrano, O.S.: Towards improved cyber security information sharing. In: 2013 5th International Conference on Cyber Conflict (CYCON 2013), pp. 1–16, June 2013

    Google Scholar 

  8. Johnson, C.S., Badger, M.L., Waltermire, D.A., Snyder, J., Skorupka, C.: Guide to Cyber Threat Information Sharing. Technical Report 800–150, NIST (2016)

    Google Scholar 

  9. Liang, G., Weller, S.R., Zhao, J., Luo, F., Dong, Z.Y.: The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans. Power Syst. 32(4), 3317–3318 (2017)

    Article  Google Scholar 

  10. Los Alamos National Laboratory: Cyber Security Science Open Data Sets. http://csr.lanl.gov/data/. Accessed 14 Aug 2017

  11. Sconzo, M.: SecRepo.com - Samples of Security Related Data. http://www.secrepo.com. Accessed 14 Aug 2017

  12. Moses, T.: eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard (2005)

    Google Scholar 

  13. Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6, November 2015

    Google Scholar 

  14. Sangster, B., et al.: Toward instrumenting network warfare competitions to generate labeled datasets. In: CSET (2009)

    Google Scholar 

  15. Serrano, O., Dandurand, L., Brown, S.: On the design of a cyber security data sharing system. In: Proceedings of the 2014 ACM Workshop on Information Sharing & #38; Collaborative Security, pp. 61–69, WISCS 2014. ACM, New York (2014)

    Google Scholar 

  16. Tejay, G., Dhillon, G., Chin, A.G.: Data quality dimensions for information systems security: a theoretical exposition (Invited Paper). In: Dowland, P., Furnell, S., Thuraisingham, B., Wang, X.S. (eds.) Security Management, Integrity, and Internal Control in Information Systems. IICIS 2004. IFIP International Federation for Information Processing, vol. 193. Springer, Boston (2005). https://doi.org/10.1007/0-387-31167-X_2

  17. Thakkar, H., Endris, K.M., Gimenez-Garcia, J.M., Debattista, J., Lange, C., Auer, S.: Are linked datasets fit for open-domain question answering? a quality assessment. In: Proceedings of the 6th International Conference on Web Intelligence, Mining and Semantics, p. 19. ACM (2016)

    Google Scholar 

  18. VERIZON: The Vocabulary for Event Recording and Incident Sharing (VERIS). http://veriscommunity.net/. Accessed 21 Nov 2016

  19. VERIZON: VERIS Community Database. http://vcdb.org/. Accessed 21 Nov 2016

  20. Zaveri, A., Rula, A., Maurino, A., Pietrobon, R., Lehmann, J., Auer, S.: Quality assessment for linked data: a survey. Seman. Web 7(1), 63–93 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Benjamin Aziz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aziz, B., Lee, J.A., Akkuzu, G. (2019). Evaluating the Quantity of Incident-Related Information in an Open Cyber Security Dataset. In: Abramowicz, W., Corchuelo, R. (eds) Business Information Systems Workshops. BIS 2019. Lecture Notes in Business Information Processing, vol 373. Springer, Cham. https://doi.org/10.1007/978-3-030-36691-9_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36691-9_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36690-2

  • Online ISBN: 978-3-030-36691-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics