Anomaly detection under cognitive security model
Cybersecurity attacks are considered among the top five of risks worldwide, according to the World Economic Forum in the year 2019. This context has generated the need to improve the tasks of cybersecurity defense in organizations. Improving the effectiveness in executing a cybersecurity task requir...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Escuela Politécnica Nacional (EPN)
2020-12-01
|
Series: | Latin-American Journal of Computing |
Subjects: | |
Online Access: | https://lajc.epn.edu.ec/index.php/LAJC/article/view/221 |
id |
doaj-eccd6fc69b6845ee9ec7d8106f1fba42 |
---|---|
record_format |
Article |
spelling |
doaj-eccd6fc69b6845ee9ec7d8106f1fba422021-04-20T15:42:46ZengEscuela Politécnica Nacional (EPN)Latin-American Journal of Computing1390-92661390-91342020-12-01723447221Anomaly detection under cognitive security modelJonathan Herrera0Roberto Omar Andrade1Miguel Flores2Susana Cadena3Escuela Politécnica NacionalEscuela Politécnica NacionalEscuela Politécnica NacionalUniversidad Central del EcuadorCybersecurity attacks are considered among the top five of risks worldwide, according to the World Economic Forum in the year 2019. This context has generated the need to improve the tasks of cybersecurity defense in organizations. Improving the effectiveness in executing a cybersecurity task requires three pillars: people, processes and technologies. The proposal in this work is to analyze the integration of these three components as a strategy to improve the effectiveness of the execution of operational tasks in cyber defense, specifically the detection of anomalies. Based on the foundation that: cybersecurity operational tasks carried out daily by analysts require the use of cognitive processes, and that the use of techniques based on technologies such as machine learning, data mining and data science have generally been used to automate cybersecurity tasks, we have considered the use of cognitive security, as a strategy to improve the anomaly detection process, taking into account the cognitive processes and skills that are executed by the security analyst.https://lajc.epn.edu.ec/index.php/LAJC/article/view/221cyber-defense, cognitive security, cybersecurity |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jonathan Herrera Roberto Omar Andrade Miguel Flores Susana Cadena |
spellingShingle |
Jonathan Herrera Roberto Omar Andrade Miguel Flores Susana Cadena Anomaly detection under cognitive security model Latin-American Journal of Computing cyber-defense, cognitive security, cybersecurity |
author_facet |
Jonathan Herrera Roberto Omar Andrade Miguel Flores Susana Cadena |
author_sort |
Jonathan Herrera |
title |
Anomaly detection under cognitive security model |
title_short |
Anomaly detection under cognitive security model |
title_full |
Anomaly detection under cognitive security model |
title_fullStr |
Anomaly detection under cognitive security model |
title_full_unstemmed |
Anomaly detection under cognitive security model |
title_sort |
anomaly detection under cognitive security model |
publisher |
Escuela Politécnica Nacional (EPN) |
series |
Latin-American Journal of Computing |
issn |
1390-9266 1390-9134 |
publishDate |
2020-12-01 |
description |
Cybersecurity attacks are considered among the top five of risks worldwide, according to the World Economic Forum in the year 2019. This context has generated the need to improve the tasks of cybersecurity defense in organizations. Improving the effectiveness in executing a cybersecurity task requires three pillars: people, processes and technologies. The proposal in this work is to analyze the integration of these three components as a strategy to improve the effectiveness of the execution of operational tasks in cyber defense, specifically the detection of anomalies. Based on the foundation that: cybersecurity operational tasks carried out daily by analysts require the use of cognitive processes, and that the use of techniques based on technologies such as machine learning, data mining and data science have generally been used to automate cybersecurity tasks, we have considered the use of cognitive security, as a strategy to improve the anomaly detection process, taking into account the cognitive processes and skills that are executed by the security analyst. |
topic |
cyber-defense, cognitive security, cybersecurity |
url |
https://lajc.epn.edu.ec/index.php/LAJC/article/view/221 |
work_keys_str_mv |
AT jonathanherrera anomalydetectionundercognitivesecuritymodel AT robertoomarandrade anomalydetectionundercognitivesecuritymodel AT miguelflores anomalydetectionundercognitivesecuritymodel AT susanacadena anomalydetectionundercognitivesecuritymodel |
_version_ |
1721517666473082880 |