973
Views
38
CrossRef citations to date
0
Altmetric
Original Articles

A Vine Copula Model for Predicting the Effectiveness of Cyber Defense Early-Warning

, ORCID Icon &
Pages 508-520 | Received 01 Apr 2016, Published online: 28 Apr 2017

References

  • Aas, K., Czado, C., Frigessi, A., and Bakken, H. (2009), “Pair-Copula Constructions of Multiple Dependence,” Insurance: Mathematics and Economics, 44, 182–198.
  • Bauwens, L., Laurent, S., and Rombouts, J. V. (2006), “Multivariate GARCH Models: A Survey,” Journal of Applied Econometrics, 21, 79–109.
  • Bedford, T., and Cooke, R. M. (2002), “Vines: A New Graphical Model for Dependent Random Variables,” Annals of Statistics, 30, 1031–1068.
  • Cao, J., Davis, D., Vander Wiel, S., and Yu, B. (2000), “Time-Varying Network Tomography: Router Link Data,” Journal of the American Statistical Association, 95, 1063–1075.
  • Castro, R., Coates, M., Liang, G., Nowak, R., and Yu, B. (2004), “Network Tomography: Recent Developments,” Statistical Science, 19, 499–517.
  • Chandola, V., Banerjee, A., and Kumar, V. (2009), “Anomaly Detection: A Survey,” ACM Computing Surveys, 15, 1–19.
  • Chen, Y. Z., Huang, Z. G., Xu, S., and Lai, Y. C. (2015), “Spatiotemporal Patterns and Predictability of Cyberattacks,” PLOS One, 10, e0131501.
  • Claffy, K., Braun, H., and Polyzos, G. (1995), “A Parameterizable Methodology for Internet Traffic Flow Profiling,” IEEE Journal on Selected Areas in Communications, 13, 1481–1494.
  • Denning, D. E. (1987), “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering, 2, 222–232.
  • Diks, C., Panchenko, V., and Van Dijk, D. (2010), “Out-of-Sample Comparison of Copula Specifications in Multivariate Density Forecasts,” Journal of Economic Dynamics and Control, 34, 1596–1609.
  • ——— (2011), “Likelihood-Based Scoring Rules for Comparing Density Forecasts in Tails,” Journal of Econometrics, 163, 215–230.
  • Dißmann, J., Brechmann, E. C., Czado, C., and Kurowicka, D. (2013), “Selecting and Estimating Regular Vine Copulae and Application to Financial Returns,” Computational Statistics & Data Analysis, 59, 52–69.
  • Fernandez, C., and Steel, M. F. J. (1998), “On Bayesian Modeling of Fat Tails and Skewness,” Journal of the American Statistical Association, 93, 359–371.
  • Gandotra, E., Bansal, D., and Sofat, S. (2015), “Computational Techniques for Predicting Cyber Threats,” in Intelligent Computing, Communication and Devices, eds. L. C. Jain, S. Patnaik, and N. Ichalkaranje, New York: Springer, pp. 247–253.
  • Genest, C., Ghoudi, K., and Rivest, L. P. (1998), “Discussion of “Understanding Relationships Using Copulas,” by Edward W., Frees and Emiliano A. Valdez,” North American Actuarial Journal, 2, 143–149.
  • Genest, C., and Nešlehová, J. G. (2013), “Assessing and Modeling Asymmetry in Bivariate Continuous Data,” in Copulae in Mathematical and Quantitative Finance, eds. P. Jaworski, F. Durante, and W. K. Härdle, New York: Springer, pp. 91–114.
  • Giacomini, R., and White, H. (2006), “Tests of Conditional Predictive Ability,” Econometrica, 74, 1545–1578.
  • Hansen, P. R., and Lunde, A. (2005), “A Forecast Comparison of Volatility Models: Does Anything Beat a Garch(1, 1)?” Journal of Applied Econometrics, 20, 873–889.
  • Hussain, A., Heidemann, J., and Papadopoulos, C. (2003), “A Framework for Classifying Denial of Service Attacks,” in Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 99–110.
  • Ishida, C., Arakawa, Y., Sasase, I., and Takemori, K. (2005), “Forecast Techniques for Predicting Increase or Decrease of Attacks using Bayesian Inference,” in 2005 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, pp. 450–453.
  • Joe, H. (1997), Multivariate Models and Dependence Concepts (Monographs on Statistics and Applied Probability, Vol. 73), London: Chapman & Hall.
  • Joe, H. (2014), Dependence Modeling With Copulas, Boca Raton, FL: CRC Press.
  • Jondeau, E., and Rockinger, M. (2006), “The Copula-GARCH Model of Conditional Dependencies: An International Stock Market Application,” Journal of International Money and Finance, 25, 827–853.
  • Khoudraji, A. (1995), “Contributiona L’étude Des Copules eta La Modélisation De Valeurs Extrêmes Multivariées,” Ph.D. dissertation, Université Laval.
  • Kim, D. H., Lee, T., Jung, S. O. D., In, H. P., and Lee, H. J. (2007), “Cyber Threat Trend Analysis Model using HMM,” in Third International Symposium on Information Assurance and Security, pp. 177–182.
  • Kolaczyk, E. D., and Csárdi, G. (2014), Statistical Analysis of Network Data With R, ( Vol. 65), New York: Springer.
  • Kurowicka, D., and Joe, H. (2011), Dependence Modeling: Vine Copula Handbook, Singapore: World Scientific Publishing Company.
  • Lau, F., Rubin, S., Smith, M., and Trajkovic, L. (2000), “Distributed Denial of Service Attacks,” in IEEE International Conference on Systems, Man, and Cybernetics ( Vol. 3), pp. 2275–2280.
  • Luo, W., Xu, L., Zhan, Z., Zheng, Q., and Xu, S. (2014), High Performance Cloud Auditing and Applications, New York: Springer.
  • Markou, M., and Singh, S. (2003), “Novelty Detection: A Review,” Signal Processing, 83, 2481–2497.
  • Moore, D., Shannon, C., Brown, D., Voelker, G., and Savage, S. (2006), “Inferring Internet Denial-of-Service Activity,” ACM Transactions on Computer Systems, 24, 115–139.
  • Morales-Nápoles, O. (2010), “Counting Vines,” in Dependence Modeling: Vine Copula Handbook, eds. H. Joe and D. Kurowicka, Singapore: World Scientific, pp. 189–218.
  • Neil, J., Hash, C., Brugh, A., Fisk, M., and Storlie, C. B. (2013), “Scan Statistics for the Online Detection of Locally Anomalous Subgraphs,” Technometrics, 55, 403–414.
  • Nikoloulopoulos, A. K., Joe, H., and Li, H. (2012), “Vine Copulas With Asymmetric Tail Dependence and Applications to Financial Return Data,” Computational Statistics & Data Analysis, 56, 3659–3673.
  • Park, K., and Willinger, W. (2000), Self-Similar Network Traffic and Performance Evaluation, Wiley Online Library.
  • Patton, A. J. (2009), “Copula-Based Models for Financial Time Series,” in Handbook of Financial Time Series, eds. T. Mikosch, J.-P. Kreiß, R. A. Davis, and T. G. Andersen, New York: Springer, pp. 767–785.
  • Pendleton, M., Garcia-Lebron, R., and Xu, S. ( in press), “A Survey on Security Metrics,” ACM Computing Survey.
  • Reveron, D. S. (2012), Cyberspace and National Security, Washington, DC: Georgetown University Press.
  • Sklar, A. (1959), “Fonctions De Répartition à n Dimensions et Leurs Marges,” Publications de l’Institut de statistique de l’University? de Paris, 8, 229–231.
  • Vardi, Y. (1996), “Network Tomography: Estimating Source-Destination Traffic Intensities from Link Data,” Journal of the American Statistical Association, 91, 365–377.
  • Weiler, N. (2002), “Honeypots for Distributed Denial-of-Service Attacks,” in Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 109–114.
  • Wustrow, E., Karir, M., Bailey, M., Jahanian, F., and Huston, G. (2010), “Internet Background Radiation Revisited,” in Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 62–74.
  • Xu, M., Da, G., and Xu, S. (2015), “Cyber Epidemic Models With Dependences,” Internet Mathematics, 11, 62–92.
  • Xu, S. (2014), “Cybersecurity Dynamics,” in Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, pp. 14.
  • Yong, Z., Tan, X., and Xi, H. (2007), “A Novel Approach to Network Security Situation Awareness Based on Multi-Perspective Analysis,” in 2007 International Conference on Computational Intelligence and Security, pp. 768–772.
  • Zhan, Z., Xu, M., and Xu, S. (2013), “Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study,” IEEE Transactions on Information Forensics and Security, 8, 1775–1789.
  • ——— (2014), “A Characterization of Cybersecurity Posture from Network Telescope Data,” in Proceedings of the 6th International Conference on Trustworthy Systems, pp. 256–266.
  • ——— (2015), “Predicting Cyber Attack Rates with Extreme Values,” IEEE Transactions on Information Forensics and Security, 10, 1666–1677.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.