International Workshop on Big Data Analytics for Cyber Threat Hunting

CyberHunt - 2018


Computer Security & Cryptography Security & Trust & Testing



The IEEE International Workshop on Big Data Analytics for Cyber Threat Hunting (CyberHunt 2018) is organised by the SecurityLab of University of Oslo (Norway) and West Virginia University (USA) in conjunction with the 2018 IEEE International Conference on Big Data (IEEE Big Data 2018). The workshop will be held during Dec 10-13, 2018 in Seattle, Washington, USA.
#Workshop Description#
As cyber-crimes against critical infrastructure and large organisations increase and evolve, automated systems to supplement human analysis are required. In addition, hunting for breaches is like looking for a needle in a haystack. Such organisations are so large, with so much information and data to sort for actionable intelligence, that just knowing where to begin seems impossible. Intelligence analysis of an attack is traditionally an iterative mainly manual process going through unlimited amounts of data trying to determine sophisticated patterns and behaviours of intruders. Furthermore, most detected intrusions will provide a limited set of attributes about a single phase of an attack. Knowing all the stages of an intrusion accurately and in a timely manner would allow us to aid our cyber detective and preventive capabilities, as well as enrich our cyber threat intelligence and facilitate immediate threat information sharing, since we put several pieces together. The workshop is expected to address the aforementioned issues and will aim at presenting novel research in the area of cyber-threat hunting, cyber-threat intelligence and big data analytics.
#Research Topics#
Data Science
1. Models for forecasting cyber-attacks and measuring impact
2. Models for attack-pattern recognition
3. Data representation and fusion
4. Applications of intelligent decision support
5. Models that take into consideration Deception and Uncertainty in cyber-attack attribution
Tools
1. Threat Hunting
2. Malware Analysis & Detection
3. Forensics Investigation
4. Cyber Threat Intelligence
5. Intrusion detection and Incident Response
6. Visualization techniques for intelligence analysis and investigation
7. Logs Analysis
8. Phishing and Spear-Phishing detection and Prevention
Decision Making and Interaction
1. Analytical reasoning systems
2. Resilience in intelligence analysis
3. Legal, privacy and ethical factors in intelligence analysis
4. Improved situational awareness
5. Decision making
6. Interactive and computational decision support
7. Investigative and analytic decision making
Data
1. Novel datasets
2. Data simulation
3. Anonymization techniques
4. Data collection, filtering and storage analysis
5. New formats and Taxonomies
6. Semantic Modeling and Data Representation
Special invitation:
- Modern Authentication (Mobile, Biometrics and Advanced Analytics)
- Physical Security and Insider Threats
#The Organizing Committee#
Vasileios Mavroeidis – University of Oslo, Norway (vasileim@ifi.uio.no)
Kamer Vishi – University of Oslo, Norway (kamerv@ifi.uio.no)
Audun Jøsang – University of Oslo, Norway (audun.josang@mn.uio.no)
Thirimachos Bourlai – West Virginia University, USA (Thirimachos.Bourlai@mail.wvu.edu)
Mary Dillon – West Virginia University, USA (Mary.Dillon@mail.wvu.edu)
#Paper Guidelines#
The authors are invited to submit a full-length paper (up to 10 pages) or short papers (up to 6 pages).
Papers should be formatted to IEEE Computer Society Proceedings Manuscript Formatting Guidelines.
#Publication#
Authors of accepted papers must guarantee that their paper will be presented at the conference. The IEEE reserves the right to exclude or remove a paper from from IEEE Xplore® if the paper is not presented at the conference.
Workshop Page: https://securitylab.no/cyberhunt2018/
Submission Page: https://wi-lab.com/cyberchair/2018/bigdata18/scripts/submit.php?subarea=S39
#Confirmed Keynote Speaker#
Simon Pope: Principal Security Group Program Manager, MSRC Incident Response - Microsoft