Anomaly detection under cognitive security model

Cybersecurity attacks are considered among the top five of risks worldwide, according to the World Economic Forum in the year 2019. This context has generated the need to improve the tasks of cybersecurity defense in organizations. Improving the effectiveness in executing a cybersecurity task requir...

Full description

Bibliographic Details
Main Authors: Jonathan Herrera, Roberto Omar Andrade, Miguel Flores, Susana Cadena
Format: Article
Language:English
Published: Escuela Politécnica Nacional (EPN) 2020-12-01
Series:Latin-American Journal of Computing
Subjects:
Online Access:https://lajc.epn.edu.ec/index.php/LAJC/article/view/221
id doaj-eccd6fc69b6845ee9ec7d8106f1fba42
record_format Article
spelling doaj-eccd6fc69b6845ee9ec7d8106f1fba422021-04-20T15:42:46ZengEscuela Politécnica Nacional (EPN)Latin-American Journal of Computing1390-92661390-91342020-12-01723447221Anomaly detection under cognitive security modelJonathan Herrera0Roberto Omar Andrade1Miguel Flores2Susana Cadena3Escuela Politécnica NacionalEscuela Politécnica NacionalEscuela Politécnica NacionalUniversidad Central del EcuadorCybersecurity attacks are considered among the top five of risks worldwide, according to the World Economic Forum in the year 2019. This context has generated the need to improve the tasks of cybersecurity defense in organizations. Improving the effectiveness in executing a cybersecurity task requires three pillars: people, processes and technologies. The proposal in this work is to analyze the integration of these three components as a strategy to improve the effectiveness of the execution of operational tasks in cyber defense, specifically the detection of anomalies. Based on the foundation that: cybersecurity operational tasks carried out daily by analysts require the use of cognitive processes, and that the use of techniques based on technologies such as machine learning, data mining and data science have generally been used to automate cybersecurity tasks, we have considered the use of cognitive security, as a strategy to improve the anomaly detection process, taking into account the cognitive processes and skills that are executed by the security analyst.https://lajc.epn.edu.ec/index.php/LAJC/article/view/221cyber-defense, cognitive security, cybersecurity
collection DOAJ
language English
format Article
sources DOAJ
author Jonathan Herrera
Roberto Omar Andrade
Miguel Flores
Susana Cadena
spellingShingle Jonathan Herrera
Roberto Omar Andrade
Miguel Flores
Susana Cadena
Anomaly detection under cognitive security model
Latin-American Journal of Computing
cyber-defense, cognitive security, cybersecurity
author_facet Jonathan Herrera
Roberto Omar Andrade
Miguel Flores
Susana Cadena
author_sort Jonathan Herrera
title Anomaly detection under cognitive security model
title_short Anomaly detection under cognitive security model
title_full Anomaly detection under cognitive security model
title_fullStr Anomaly detection under cognitive security model
title_full_unstemmed Anomaly detection under cognitive security model
title_sort anomaly detection under cognitive security model
publisher Escuela Politécnica Nacional (EPN)
series Latin-American Journal of Computing
issn 1390-9266
1390-9134
publishDate 2020-12-01
description Cybersecurity attacks are considered among the top five of risks worldwide, according to the World Economic Forum in the year 2019. This context has generated the need to improve the tasks of cybersecurity defense in organizations. Improving the effectiveness in executing a cybersecurity task requires three pillars: people, processes and technologies. The proposal in this work is to analyze the integration of these three components as a strategy to improve the effectiveness of the execution of operational tasks in cyber defense, specifically the detection of anomalies. Based on the foundation that: cybersecurity operational tasks carried out daily by analysts require the use of cognitive processes, and that the use of techniques based on technologies such as machine learning, data mining and data science have generally been used to automate cybersecurity tasks, we have considered the use of cognitive security, as a strategy to improve the anomaly detection process, taking into account the cognitive processes and skills that are executed by the security analyst.
topic cyber-defense, cognitive security, cybersecurity
url https://lajc.epn.edu.ec/index.php/LAJC/article/view/221
work_keys_str_mv AT jonathanherrera anomalydetectionundercognitivesecuritymodel
AT robertoomarandrade anomalydetectionundercognitivesecuritymodel
AT miguelflores anomalydetectionundercognitivesecuritymodel
AT susanacadena anomalydetectionundercognitivesecuritymodel
_version_ 1721517666473082880