A data-driven analysis of UK cyber defence
- URL: http://arxiv.org/abs/2303.07313v1
- Date: Mon, 13 Mar 2023 17:34:32 GMT
- Title: A data-driven analysis of UK cyber defence
- Authors: Justin McKeown
- Abstract summary: This research presents an analysis of malicious internet scanning activity collected within the UK between 1st December 2020 and the 30th November 2021.
The potential exists to better improve UK cyber defence by improving how citizens are supported in preventing, detecting and responding to cyber threats.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Our research addresses the question: What are the conditions of the UK's
cyber threat landscape? In addressing this we focus on detectable, known and
therefore potentially preventable cyber threats, specifically those that are
identifiable by the types of malicious scanning activities they exhibit. We
have chosen this approach for two reasons. First, as is evidenced herein, the
vast majority of cyber threats affecting the lives and business endeavours of
UK citizens are identifiable, preventable threats. Thus the potential exists to
better improve UK cyber defence by improving how citizens are supported in
preventing, detecting and responding to cyber threats. Achieving this requires
an evidence base to inform policy makers. Second, it is potentially useful to
build a quantifiable evidence base of the known threat space - that is to say
detectable, identifiable and therefore potentially preventable cyber threats -
to ascertain if this information may also be useful when attempting to detect
the emergence of more novel cyber threats. This research presents an analysis
of malicious internet scanning activity collected within the UK between 1st
December 2020 and the 30th November 2021. The data was gathered via a custom
automated system which collected and processed data from Greynoise, enriched
this via Shodan, cross referencing it with data from the Office of National
Statistics and proprietorial data on UK place names and geolocation.
Related papers
- Cyber Threats to Canadian Federal Election: Emerging Threats, Assessment, and Mitigation Strategies [2.04903126350824]
Recent foreign interference in elections globally highlight the increasing sophistication of adversaries in exploiting technical and human vulnerabilities.
To mitigate these vulnerabilities, a threat assessment is crucial to identify emerging threats, develop incident response capabilities, and build public trust and resilience against cyber threats.
The research identifies three major threats: misinformation, disinformation, and malinformation (MDM) campaigns; attacks on critical infrastructure and election support systems; and espionage by malicious actors.
arXiv Detail & Related papers (2024-10-07T23:40:40Z) - An In Depth Analysis of a Cyber Attack: Case Study and Security Insights [0.0]
Nation-sponsored cyberattacks pose a significant threat to national security.
One of the most impactful cyber threats affecting South Korea's banking sector and infrastructure was the DarkSeoul cyberattack.
Believed to have been orchestrated by North Korean state-sponsored hackers, the attack caused widespread disruption.
arXiv Detail & Related papers (2024-09-28T00:47:38Z) - Analysing India's Cyber Warfare Readiness and Developing a Defence Strategy [0.0]
The demand for strong cyber defence measures grows, especially in countries such as India.
The literature review reveals significant shortcomings in India's cyber defence readiness.
The study proposes an educational framework for training cyber professionals.
arXiv Detail & Related papers (2024-06-18T12:55:07Z) - Towards in-situ Psychological Profiling of Cybercriminals Using Dynamically Generated Deception Environments [0.0]
Cybercrime is estimated to cost the global economy almost $10 trillion annually.
Traditional perimeter security approach to cyber defence has so far proved inadequate to combat the growing threat of cybercrime.
Deceptive techniques aim to mislead attackers, diverting them from critical assets whilst simultaneously gathering cyber threat intelligence on the threat actor.
This article presents a proof-of-concept system that has been developed to capture the profile of an attacker in-situ, during a simulated cyber-attack in real time.
arXiv Detail & Related papers (2024-05-19T09:48:59Z) - On the Security Risks of Knowledge Graph Reasoning [71.64027889145261]
We systematize the security threats to KGR according to the adversary's objectives, knowledge, and attack vectors.
We present ROAR, a new class of attacks that instantiate a variety of such threats.
We explore potential countermeasures against ROAR, including filtering of potentially poisoning knowledge and training with adversarially augmented queries.
arXiv Detail & Related papers (2023-05-03T18:47:42Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Deep Fake Detection, Deterrence and Response: Challenges and
Opportunities [3.411353611073677]
78% of Canadian organizations experienced at least one successful cyberattack in 2020.
Specialists predict that the global loss from cybercrime will reach 10.5 trillion US dollars annually by 2025.
Deepfakes garnered attention for their potential use in creating fake news, hoaxes, revenge porn, and financial fraud.
arXiv Detail & Related papers (2022-11-26T21:23:30Z) - Untargeted Backdoor Attack against Object Detection [69.63097724439886]
We design a poison-only backdoor attack in an untargeted manner, based on task characteristics.
We show that, once the backdoor is embedded into the target model by our attack, it can trick the model to lose detection of any object stamped with our trigger patterns.
arXiv Detail & Related papers (2022-11-02T17:05:45Z) - Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against
Fact-Verification Systems [80.3811072650087]
We show that it is possible to subtly modify claim-salient snippets in the evidence and generate diverse and claim-aligned evidence.
The attacks are also robust against post-hoc modifications of the claim.
These attacks can have harmful implications on the inspectable and human-in-the-loop usage scenarios.
arXiv Detail & Related papers (2022-09-07T13:39:24Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - Digital Ariadne: Citizen Empowerment for Epidemic Control [55.41644538483948]
The COVID-19 crisis represents the most dangerous threat to public health since the H1N1 pandemic of 1918.
Technology-assisted location and contact tracing, if broadly adopted, may help limit the spread of infectious diseases.
We present a tool, called 'diAry' or 'digital Ariadne', based on voluntary location and Bluetooth tracking on personal devices.
arXiv Detail & Related papers (2020-04-16T15:53:42Z) - Challenges in Forecasting Malicious Events from Incomplete Data [6.656003516101928]
Researchers have attempted to combine external data with machine learning algorithms to learn indicators of impending cyber-attacks.
But successful cyber-attacks represent a tiny fraction of all attempted attacks.
As we show in this paper, the process of filtering reduces the predictability of cyber-attacks.
arXiv Detail & Related papers (2020-04-06T22:57:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.