337
Views
4
CrossRef citations to date
0
Altmetric
Articles

Modeling multivariate cyber risks: deep learning dating extreme value theory

, , , &
Pages 610-630 | Received 28 Sep 2020, Accepted 24 May 2021, Published online: 04 Jun 2021

References

  • Z. Che, S. Purushotham, K. Cho, D. Sontag, and Y. Liu, Recurrent neural networks for multivariate time series with missing values, Sci. Rep. 8 (2018), pp. 1–12.
  • K. Cho, B. van Merriënboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, and Y. Bengio, Learning phrase representations using RNN encoder-decoder for statistical machine translation, preprint (2014). Available at arXiv:1406.1078.
  • P.F. Christoffersen, Evaluating interval forecasts, Int. Econ. Rev. (Philadelphia) 39 (1998), pp. 841–862.
  • P. Coulibaly and C.K. Baldwin, Nonstationary hydrological time series forecasting using nonlinear dynamic methods, J. Hydrol. (Amst) 307 (2005), pp. 164–174.
  • L. De Haan and A. Ferreira, Extreme Value Theory: An Introduction, Springer Science & Business Media, Berlin, 2007.
  • L. Deng and D. Yu, Deep learning: Methods and applications, Found. Trends® Signal Process. 7 (2014), pp. 197–387.
  • Department of Homeland Security, National critical infrastructure security and resilience research and development plan, 2015. Available at http://publish.illinois.edu/ciri-new-theme/files/2016/09/National-CISR-RD-Plan-Nov-2015.pdf.
  • P. Dixit and S. Silakari, Deep learning algorithms for cybersecurity applications: A technological and status review, Comput. Sci. Rev. 39 (2021), p. 100317.
  • X. Fang, M. Xu, S. Xu, and P. Zhao, A deep learning framework for predicting cyber attacks rates, EURASIP J. Inf. Sec. 2019 (2019), pp. 1–11.
  • X. Fang and Z. Yuan, Performance enhancing techniques for deep learning models in time series forecasting, Eng. Appl. Artif. Intell. 85 (2019), pp. 533–542.
  • H. Goel, I. Melnyk, and A. Banerjee, R2N2: Residual recurrent neural networks for multivariate time series forecasting, preprint (2017). Available at arXiv:1709.03159.
  • I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, MIT Press, Massachusetts, 2016. Available at http://www.deeplearningbook.org.
  • S. Hochreiter and J. Schmidhuber, Long short-term memory, Neural. Comput. 9 (1997), pp. 1735–1780.
  • R.J. Hyndman and A.B. Koehler, Another look at measures of forecast accuracy, Int. J. Forecast. 22 (2006), pp. 679–688.
  • J. Jacobs and B. Rudis, Data-driven security: Dataset collection, 2020. Available at https://datadrivensecurity.info/blog/pages/dds-dataset-collection.html.
  • J. Jang-Jaccard and S. Nepal, A survey of emerging threats in cybersecurity, J. Comput. Syst. Sci. 80 (2014), pp. 973–993.
  • D.P. Kingma and J. Ba, Adam: A method for stochastic optimization, preprint (2014). Available at arXiv:1412.6980.
  • B. Krause, L. Lu, I. Murray, and S. Renals, Multiplicative LSTM for sequence modelling, preprint (2016). Available at arXiv:1609.07959.
  • M. Längkvist, L. Karlsson, and A. Loutfi, A review of unsupervised feature learning and deep learning for time-series modeling, Pattern. Recognit. Lett. 42 (2014), pp. 11–24.
  • G. Lai, W.-C. Chang, Y. Yang, and H. Liu, Modeling long-and short-term temporal patterns with deep neural networks, Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018, pp. 95–104.
  • X. Ling, Y. Rho, and C.-W. Ten, Predicting global trend of cybersecurity on continental honeynets using vector autoregression, in 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), IEEE, Turin, 2019, pp. 1–5.
  • A.J. McNeil and R. Frey, Estimation of tail-related risk measures for heteroscedastic financial time series: An extreme value approach, J. Empirical Financ. 7 (2000), pp. 271–300.
  • A.J. McNeil, R. Frey, and P. Embrechts, Quantitative Risk Management: Concepts, Techniques, and Tools, Princeton University Press, Princeton, NJ, 2010.
  • C. Peng, M. Xu, S. Xu, and T. Hu, Modeling multivariate cybersecurity risks, J. Appl. Stat. 45 (2018), pp. 2718–2740.
  • Ponemon Institute, Cost of a data breach report, 2020. Available at https://www.ibm.com/security/digital-assets/cost-data-breach-report/#/.
  • O.B. Sezer, M.U. Gudelek, and A.M. Ozbayoglu, Financial time series forecasting with deep learning: A systematic literature review: 2005–2019, Appl. Soft. Comput. 90 (2020), p. 106181.
  • L. Spitzner, The honeynet project: Trapping the hackers, IEEE Security Priv. 1 (2003), pp. 15–23.
  • B. Wang, T. Li, Z. Yan, G. Zhang, and J. Lu, Deeppipe: A distribution-free uncertainty quantification approach for time series forecasting, Neurocomputing 397 (2020), pp. 11–19.
  • M. Xu and L. Hua, Cybersecurity insurance: Modeling and pricing, N. Am. Actuar. J. 23 (2019), pp. 220–249.
  • M. Xu, L. Hua, and S. Xu, A vine copula model for predicting the effectiveness of cyber defense early-warning, Technometrics 59 (2017), pp. 508–520.
  • Z. Zhan, M. Xu, and S. Xu, Characterizing honeypot-captured cyber attacks: Statistical framework and case study, IEEE Trans. Inf. Forensics Security 8 (2013), pp. 1775–1789.
  • Z. Zhan, M. Xu, and S. Xu, Predicting cyber attack rates with extreme values, IEEE Trans. Inf. Forensics Security 10 (2015), pp. 1666–1677.
  • X. Zhang, F. Shen, J. Zhao, and G. Yang, Time series forecasting using gru neural network with multi-lag after decomposition, in Neural Information Processing, D. Liu, S. Xie, Y. Li, D. Zhao, and E. M. El-Alfy, eds., Springer International Publishing, Cham, 2017, pp. 523–532.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.