text
stringlengths
0
1.45k
<s>[INST] of such attacks are well [/INST] described in Davidoff andHam (2012) </s>
<s>[INST] from the point of view [/INST] of network forensics. There are </s>
<s>[INST] a number of problems that [/INST] can be addressed by analysing </s>
<s>[INST] network data. A primary example [/INST] is constructing anomaly detection meth-ods </s>
<s>[INST] to identify when unusual traffic [/INST] occurs. These complement signature-based methods, </s>
<s>[INST] such as those embodied for [/INST] example in the Snort intrusion </s>
<s>[INST] vJanuary 17, 2014 17:33 9in [/INST] x 6in Data Analysis for </s>
<s>[INST] Network Cyber Security b1711-fm vi [/INST] Preface detection system (Caswell et </s>
<s>[INST] al., 2007). We believe the [/INST] next generation of detection tools </s>
<s>[INST] will have to utilise more [/INST] information about past and presenttraffic </s>
<s>[INST] behaviour, particularly with res pect [/INST] to temporal aspects. A particu- </s>
<s>[INST] lar advantage of anomaly detection [/INST] methods over rule-based approaches istheir </s>
<s>[INST] potential to detect new, so-called [/INST] zero-day , attacks. There are </s>
<s>[INST] significant challenges when addressing network [/INST] data analysis problems. In the </s>
<s>[INST] context of cyber-secu rity, data [/INST] sets are typically big, con- </s>
<s>[INST] sisting of a large number [/INST] of nodes and a great </s>
<s>[INST] volume of traffic on existingedges. [/INST] This alone raises significant computational </s>
<s>[INST] challenges. If anomalydetection is the [/INST] objective, then timeliness becomes an </s>
<s>[INST] issue, and the veloc- ityof [/INST] the traffic on edges becomes </s>
<s>[INST] an important factor. The combination [/INST] of volume and velocity makes </s>
<s>[INST] much network cyber-security a “big-data”problem. [/INST] From a statistical or machine </s>
<s>[INST] learning point of view, many [/INST] cyber-security problems are unsupervised , </s>
<s>[INST] which raises generic problems of [/INST] model selection and control of </s>
<s>[INST] hyperparameters and decision boundaries. Thesedata [/INST] analysis problems are generally exacerbated </s>
<s>[INST] by increases in the vol-ume, [/INST] velocity and heterogeneity of network </s>
<s>[INST] data. The precise timing ofevents [/INST] on edges is a more </s>
<s>[INST] subtle aspect that is only [/INST] recently being seriously explored. This </s>
<s>[INST] latter aspect is exte nsively [/INST] addressed in this volume. The </s>
<s>[INST] above discussion is intended to [/INST] make the case that cyber-security </s>
<s>[INST] is both an important and [/INST] interesting research problem. Some of </s>
<s>[INST] the researchopportunities are discu ssed [/INST] in more detail in Meza </s>
<s>[INST] et al. (2009). The chap- [/INST] ters in this volume provide </s>
<s>[INST] a view of this exciting [/INST] and diverse area. To begin,Patrick </s>
<s>[INST] Wolfe and Benjamin Olding give [/INST] an introduction to the problem </s>
<s>[INST] ofstatistical inference on graphs, and [/INST] make first steps toward formal </s>
<s>[INST] inferen- tial procedures. Alex Tartakovsky [/INST] considers the problem of quickest </s>
<s>[INST] change detection in the context [/INST] of statistical anomaly detection. A </s>
<s>[INST] key concern is to min- [/INST] imise the detection delay, an </s>
<s>[INST] aspect of great importance in [/INST] many practical network cyber problems. </s>
<s>[INST] This chapter features a hybrid [/INST] anomaly-spectral-signature-based system usefu l for </s>
<s>[INST] efficient traffic filtering. Joshua Neil [/INST] and co-authors are co ncerned </s>
<s>[INST] with aspects of network traffic [/INST] that are localised in both </s>
<s>[INST] time and graph space. In [/INST] particular,they develop a scan statistic-based </s>
<s>[INST] methodology for finding connected sub-graphs [/INST] that are locally connected in </s>
<s>[INST] time and which have deviated [/INST] fromhistoric behaviour. The methodology is </s>
<s>[INST] illustrated on large-scale networktraffic data. [/INST] Summet Dua and Pradeep Chowriappa </s>
<s>[INST] address situational awareness by considering [/INST] user sentiment in social media. </s>
<s>[INST] Such sentiments can provideJanuary 17, [/INST] 2014 17:33 9in x 6in </s>
<s>[INST] Data Analysis for Network Cyber [/INST] Security b1711-fm Preface vii indicators </s>
<s>[INST] and precursors for cyber-threat. A [/INST] novel data-mining approachis proposed to </s>