CyberHunt 2018

International Workshop on Big Data Analytics for Cyber Threat Hunting 

In conjunction with the IEEE International Conference on Big Data 2018

As cyber-crimes against critical infrastructure and large organizations increase and evolve, automated systems to supplement human analysis are required. In addition, hunting for breaches is like looking for a needle in a haystack. Such organizations are so large, with so much information and data to sort for actionable intelligence, that just knowing where to begin seems impossible. Intelligence analysis of an attack is traditionally an iterative mainly manual process going through unlimited amounts of data trying to determine sophisticated patterns and behaviors of intruders. Furthermore, most detected intrusions will provide a limited set of attributes about a single phase of an attack. Knowing all the stages of an intrusion accurately and in a timely manner would allow us to aid our cyber detective and preventive capabilities, as well as enrich our cyber threat intelligence and facilitate immediate threat information sharing, since we put several pieces together. The workshop is expected to address the aforementioned issues and will aim at presenting novel research in the area of cyber-threat hunting and cyber-threat intelligence.

See the conference Web site: CyberHunt 2018

CyberHunt 2018 welcomes contributions within, but not limited to, the following areas:

  • Data Science 
    1. Models for forecasting cyber-attacks and measuring impact
    2. Models for attack-pattern recognition
    3. Data representation and fusion
    4. Applications of intelligent decision support
    5. Models that take into consideration Deception and Uncertainty in cyber-attack attribution
  • Tools
    1. Threat Hunting
    2. Malware Analysis & Detection
    3. Forensics Investigation
    4. Cyber Threat Intelligence
    5. Intrusion detection and Incident Response
    6. Visualization techniques for intelligence analysis and investigation
    7. Logs Analysis
    8. Phishing and Spear-Phishing detection and Prevention
  • Decision Making and Interaction
    1. Analytical reasoning systems
    2. Resilience in intelligence analysis
    3. Legal, privacy and ethical factors in intelligence analysis
    4. Improved situational awareness
    5. Decision making
    6. Interactive and computational decision support
    7. Investigative and analytic decision making
  • Data
    1. Novel datasets
    2. Data simulation
    3. Anonymisation techniques
    4. Data collection, filtering and storage analysis
    5. New formats and Taxonomies
    6. Semantic Modeling and Data Representation
  • Special invitation
    1. Modern Authentication (Mobile, Biometrics and Advanced Analytics)
    2. Physical Security and Insider Threats

 

Published Oct. 13, 2018 8:20 AM - Last modified Oct. 13, 2018 1:02 PM