References
- Ablon, L, and A. Bogart. 2017. zero-days, Thousands of Nights The Life and Times of Zero-Day Vulnerabilities and Their Exploits. Santa Monica, CA: RAND Corporation. ISBN: 978-0-8330-9761-3
- Anderson, H. S., A. Kharkar, B. Filar, D. Evans, and P. Roth. 2018. Learning to evade static PE machine learning malware models via reinforcement learning. arXiv preprint arXiv:1801.08917.
- Andreessen, M. 2019. Why software is eating the world? Accessed 1 September, 2020 https://www.wsj.com/articles/SB10001424053111903480904576512250915629460
- Apache-Incubating. 2020. Zipkin and Jaeger. https://developers.redhat.com/blog/2019/05/01/a-guide-to-the-open-source-distributed
- AXELOS. 2019. What is ITIL?. Accessed 5 September, 2020. https://www.axelos.com/best-practice-solutions/itil/what-is-itil
- Baah, G. T. Hobson, H. Okhravi, S. Roberts, W. Streilein, and S. Yuditskaya. 2016. A study of gaps in cyber defense automation. No. TR-1194. MIT Lincoln Laboratory, Lexington.
- Bernaschi, M. E. Gabrielli, and L. V. Mancini. 2000. Operating system enhancements to prevent the misuse of system calls. Proceedings of the 7th ACM Conference on Computer and Communications Security. New York, NY: Association for Computing Machinery.
- Böttinger, K. P. Godefroid, and R. Singh. 2018. Deep reinforcement fuzzing. In 2018 IEEE Security and Privacy Workshops (SPW), 116–122. San Francisco, CA: IEEE. doi:10.1109/SPW.2018.00026.
- Brenne, L. 2019. What is a symbiotic relationship? Accessed 2 April, 2019. https://sciencing.com/symbiotic-relationship-8794702.html
- Bullough, B. L., A. K. Yanchenko, C. L. Smith, and J. R. Zipkin. 2017. Predicting exploitation of disclosed software vulnerabilities using open-source data. In Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics (IWSPA '17). New York, NY: Association for Computing Machinery, 45–53. doi:10.1145/3041008.3041009.
- Burgess, M., H. Haugerud, S. Straumsnes, and T. Reitan. 2002. Measuring system normality. ACM Transactions on Computer Systems 20 (2):125–60. doi:10.1145/507052.507054.
- Buczak, L. A., and E. Guven. 2016. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials 18(2):1153–76. doi:10.1109/COMST.2015.2494502.
- CERT. 2019. Information sharing. Accessed 20 March, 2019. https://www.us-cert.gov/Information-Sharing-Specifications-Cybersecurity
- Chess, B, and J. West. 2007. Secure programming with static analysis. Boston, MA: Addison-Wesley Professional.
- Christiansen, M. 2017. Bypassing malware defenses. SANS. Accessed 1 September, 2020 https://www.sans.org/reading-room/whitepapers/malicious/bypassing-malware-defenses-33378
- CIS. 2019. CIS hardened images. Accessed 20 March, 2019. https://www.cisecurity.org/
- Cisco. 2018. Shadow IT. Accessed 5 September, 2020 https://www.cisco.com/c/en/us/products/security/what-is-shadow-it.html
- Columbus, L. 2019. The future of manufacturing technologies. Accessed 1 September, 2020 https://www.forbes.com/sites/louiscolumbus/2018/04/15/the-future-of-manufacturing-technologies-2018/#549b77922995
- Creech, G., and J. Hu. 2014. A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns. IEEE Transactions on Computers 63 (4):807–19. doi:10.1109/TC.2013.13.
- Darktrace. 2019. The enterprise immune system. Accessed 1 July, 2019. https://www.darktrace.com/en/technology/
- Das, P. K., A. Joshi, and T. Finin. 2017. App behavioral analysis using system calls. 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). Atlanta, GA: IEEE.
- Dayan, P., and Y. Niv. 2008. Reinforcement learning: The good, the bad and the ugly. Current Opinion in Neurobiology 18 (2):185–96. doi:10.1016/j.conb.2008.08.003.
- Denning, D. 1987. An intrusion-detection model. IEEE Transactions on Software Engineering SE-13 (2):222–32. doi:10.1109/TSE.1987.232894.
- Dietterich, T. 2018. Anomaly detection: Algorithms, explanations, applications. Oregon State University. Accessed 2 July, 2018 https://www.microsoft.com/en-us/research/video/anomaly-detection-algorithms-explanations-applications/
- DISA. 2019. STIGS. Accessed 20 March, 2019. https://iase.disa.mil/stigs/Pages/index.aspx
- Donevski, M. 2022. AISA. Cyber Today. Cybernetics and Cybersecurity. Accessed 3 May 2022. https://cybertoday.partica.online/cyber-today/cyber-today-edition-1-2022/flipbook/16/
- Domingos, P. 2018. The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World. New York, NY: Basic Books.
- Drath, R., and A. Horch. 2014. Industrie 4.0: Hit or Hype? IEEE Industrial Electronics Magazine 8 (2):56–8. doi:10.1109/MIE.2014.2312079.
- Engelbrecht, S. 2017. The evolution of SOAR platforms security orchestration, automation and response (SOAR). Accessed 1 September, 2020 https://www.securityweek.com/evolution-soar-platforms
- Forrest, S. A. S. Hofmeyr, A. Somayaji, and A. Longstaff. 1996. A sense of self for unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy (SP '96). IEEE Computer Society, Washington, DC.
- Garfinkel, T. 2003. Traps and pitfalls: Practical problems in system call interposition based security Tools. NDSS 3:163–76.
- Gaudin, B. E. Vassev, M. Hinchey, P. Nixon, D. Pagano, C. J. Garcia, and N. Narayan. 2010. State-of-the-art in self-healing and patch generation. Lero: European Commission under the Seventh Framework Programme
- Goertzel, M. K. T. Winograd, L. H. McKinley, O. J. Lyndon, M. Colon, T. McGibbon, E. Fedchak, and R. Vienneau. 2007. Software security assurance: A state-of-art report (SAR). Herndon, VA: Information Assurance Technology Analysis Centre (IATAC).
- Heraclitus. 2019. Change. Accessed 5 September, 2020 https://en.wikiquote.org/wiki/Heraclitus
- History-Computer. 2020. Manchester baby. Accessed 20 March, 2019. https://history-computer.com/ModernComputer/Electronic/SSEM.html
- Howard, M, and S. Lipner. 2006. Microsoft security development life cycle (SDL). The Security Development Lifecycle. Redmond, WA: Microsoft Press
- IBM. 2019. System calls. Accessed 25 March, 2019. https://developer.ibm.com/tutorials/l-system-calls/
- IBM-Integrity. 2020. IBM, Accessed 25 March, 2019. https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.3.0/com.ibm.zos.v2r3.ieaa800/iea3a8_System_integrity.htm
- Iwamoto, K., and K. Wasaki. 2015. the method for Shellcode extraction from malicious document file using entropy and emulation. Journal of Information Processing 56:892–902.
- Julien, J. 2018. Performance engineering. The what, why, and how’s explained. John Julien. April 19, 2018 Developer Tips, Tricks & Resources. Accessed 25 March 2019. https://stackify.com/performance-engineering/
- Khurana, U., and H. Samulowitz. 2019. Automating predictive modeling process using reinforcement learning. arXiv preprint arXiv:1903.00743.
- Kohyarnejadfard, I., D. Aloise, M. R. Dagenais, and M. Shakeri. 2021. A framework for detecting system performance anomalies using tracing data analysis. Entropy 23 (8):1011. doi:10.3390/e23081011.
- Kolosnjaji, B. A. Zarras, G. Webster, and C. Eckert. 2016. Deep learning for classification of malware system call sequences. In Australasian joint conference on artificial intelligence, 137–49. Cham: Springer.
- Kosko, B. 1994. Fuzzy thinking: The new science of fuzzy logic. Reprint ed. New York. Hyperion.
- Kozina, S. 2020. Introduction to eBPF in Red Hat Enterprise Linux 7. Red Hat. Accessed 25 March 2020. https://www.redhat.com/en/blog/introduction-ebpf-red-hat-enterprise-linux-7
- Lee, W, and D. Xiang. 2001. Information-theoretic measures for anomaly detection. In Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 130–143. Oakland, CA: IEEE.
- Mannaert, H. P. D. Bruyn, and J. Verelst. 2012. Exploring entropy in software systems: Towards a precise definition and design rules. In Proceedings of the Seventh International Conference on Systems, ICONS, 93–9.
- Morgan, S. 2017. Cybersecurity jobs report 2018–2021. Accessed 1 September, 2020. https://cybersecurityventures.com/jobs/
- Nagios XI. Nagios-XI. Accessed 20 March, 2019. https://hub.docker.com/r/mavenquist/nagios-xi
- NIST. 2019a. The security content automation protocol (SCAP). Accessed 20 March, 2019 https://csrc.nist.gov/projects/security-content-automation-protocol/
- NIST. 2019b. SCAP 1.3. Accessed 20 March, 2019 https://csrc.nist.gov/Projects/Security-Content-Automation-Protocol/SCAP-Releases/SCAP-1-3
- Oltsik, J, and D. Cahill. 2017. Industry leaders discuss SOAPA, security operations and analytics platform architecture (SOAPA). Accessed 1 November, 2020. https://www.esg-global.com/soapa
- Onapsis. 2019. 10KBLAZE. Accessed 5 September, 2020. https://www.onapsis.com/10kblaze
- OpenAI. 2017. OpenAI. Accessed 25 March, 2019. https://gym.openai.com/
- OpenSCAP. 2019. Accessed 20 March, 2019. https://www.open-scap.org/
- OWASP. 2019. Secure software development lifecycle project(S-SDLC). Accessed 1 September, 2020. https://www.owasp.org/index.php/OWASP_Secure_Software_Development_Lifecycle_Project
- Paganini, P. 2019. 1-day exploits. Accessed 15 March, 2019. https://securityaffairs.co/wordpress/3913/cyber-crime/1-day-exploitsbinary-diffing-patch-management-the-side-threats.html
- Public Relations Office. Government of Japan. 2019. Society 5.0. Accessed 1 September, 2020. https://www.gov-online.go.jp/eng/publicity/book/hlj/html/201905/201905_01_en.html
- Rapid7. 2017. Metasplot. Accessed 10 September, 2020 https://www.rapid7.com/db/modules/exploit/linux/http/nagios_xi_chained_rce_2_electric_boogaloo
- Red Hat. 2019. What is DevSecOps? Accessed 10 September, 2020 https://www.redhat.com/en/topics/devops/what-is-devsecops
- Ring, H. J., IV, C. M. V. Oort, S. Durst, V. White, J. P. Near, and C. Skalka. 2021. 2021. Methods for host-based intrusion detection with deep learning. Digital Threats: Research and Practice 2 (4):1–29. doi:10.1145/3461462.
- Robertson, A. 2019. bpftrace. Accessed 20 March, 2019. https://github.com/iovisor/bpftrace
- Samuel, L. A. 1959. Some studies in machine learning using the game of checkers. IBM Journal of Research and Development 3 (3):210–29. doi:10.1147/rd.33.0210.
- Schneier, B. 2018. Click here to kill everybody: Security and survival in a hyper-connected world. New York, NY: W. W. Norton & Company.
- Shannon, E. C. 1948. A mathematical theory of communication. Bell System Technical Journal 27 (3):379–423. doi:10.1002/j.1538-7305.1948.tb01338.x,.
- The State Council. The People's Republic of China. 2019. Internet Plus. Accessed 1 September, 2020. http://english.gov.cn/2016special/internetplus/
- Vaas, C, and J. Happa. 2017. Detecting disguised processes using application-behavior profiling. In 2017 IEEE International Symposium on Technologies for Homeland Security (HST), 1–6. Waltham, MA: IEEE.
- Vanschoren, J., J. N. Van Rijn, B. Bischl, and L. Torgo. 2014. OpenML: Networked science in machine learning. ACM SIGKDD Explorations Newsletter 15 (2):49–60. doi:10.1145/2641190.2641198.
- Wiener, N. 1961. Cybernetics: Or control and communication in the animal and the machine. 2nd revised ed. Paris, (Hermann & Cie) & Camb. Mass. (MIT Press.
- Whitham, J. 2016. Software engineer, rapita systems, York. Accessed 25 March, 2019. https://www.jwhitham.org/2016/02/profiling-versus-tracing.html
- Wright, S. C, and A. T. Zia. 2011. Rationally opting for the insecure alternative: Negative externalities and the selection of security controls. In Computational Intelligence in Security for Information Systems. Lecture Notes in Computer Science, Á. Herrero, E. Corchado, eds., vol. 6694. Berlin, Heidelberg: Springer.