2017 International Workshop on Big Data Analytics for Cyber Intelligence and Defense (BDA4CID 2017)


2017 IEEE International Conference on Big Data (BigData 2017), December 11-14, 2017, Boston, MA, USA


Introduction

Cyber-attacks have posed real, wide threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks, but also because of the large scale and complexity of today’s dynamic IT infrastructures.

When a significant amount of data is collected from the cyber systems operations and monitoring, data science and advanced analytics are needed to correlate, learn and mine, interpret and visualize such data. To mitigate existing cyber threats, it is important that cyber-attack detection and security analysis take advantage of data science and advanced analytics. Big data provides a systemic approach, from capturing of IT operation data, through data processing and event correlation, to attack detection and response decision.

This Workshop will focus on the cutting-edge developments from both academia and industry, with a particular emphasis on novel techniques to capture, store and process the big-data from a wide range of sources in monitoring IT infrastructures, and in particular on the methodologies and technologies can be applied to correlate, learn and mine, interpret and visualize the cyber security data.

This workshop is timely for researchers, academics and practitioners in big data processing and analytics, cyber intelligence, cyber security, cyber defense, security analytics, data mining and machine learning of security data, security information and event management, cyber-attack detection. The workshop represents the core area of big data applications, especially data mining, machine learning, computational intelligence, etc., and will bring forth a lively forum on the exciting and challenging area at the conference.

Research Topics

The workshop only considers well-written manuscripts that describe original, unpublished, state-of-the-art research and practical work. To contribute towards the advances of knowledge, the workshop welcomes submission of manuscripts from researchers and practitioners who are actively working in Big Data Analytics for Cyber Intelligence and Defense.

Indicative topics for the workshop are as follows.

- Big data analytics for cyber intelligence and attack detection
- Big data intelligence for combating advanced persistent threats (APT)
- Big data for cyber intelligence and cyber situational awareness
- Big data processing platforms for cyber security and defense
- Cyber security analytics for cloud computing
- Cyber threats in social networks
- Cyber threat intelligence and modeling
- Cyber defense/security operations centers
- Data acquisition for cyber security and defense
- Data acquisition for web mining / opinion mining / sentiment analysis
- Data mining and machine learning for cyber threat and security
- Log management for cyber security analytics
- New-generation intrusion detection/prevention systems (IDS/IPS)
- Real-time event correlation for cyber security analytics
- Real-time monitoring of computer and network systems
- Security incident management for cyber security analytics
- Security Information and Event Management (SIEM)
- Stream mining for cyber intelligence and attack detection
- Systems continuous monitoring
- Visualization for cyber intelligence and security/defense
- Visualization for web mining / opinion mining / sentiment analysis
- Vulnerability analysis and modelling
- Web mining / opinion mining / sentiment analysis

Each submission will be peer reviewed by 3 TC members.


Important Dates
Oct 10, 2017:                                Submission of full-length papers
Nov 1, 2017:                                 Notification of paper acceptance to authors
Nov 15, 2017:                               Camera-ready version of accepted papers
Dec 11-14 2017:                           Workshop

Workshop Chair

Huaglory  Tianfield

Professor of Computing, Ph.D.

Director, Cloud & Data Research Lab
Department of Computer, Communications, and Interactive Systems
Glasgow Caledonian University
United Kingdom
Contact by e-mail

International Technical Committee

Xu Chen, Jiangsu University, China
Wangli He, East China University of Science and Technology, China
Xinjun Mao, National University of Defense Technology, China
Chaoxu Mu, Tianjin University, China
Huaglory Tianfield, Glasgow Caledonian University, UK
Posco Tso, Loughborough University, UK
Thomas Win, University of Gloucestershire, UK
Chuan Xu, Chongqing University of Posts and Telecommunications, China


Program Schedule

Thursday 14 December 2017


14:00-14:20

Network Intrusion Detection using Word Embeddings
Xiaoyan Zhuo, Jialing Zhang, and Seung Woo Son

[slides]

14:20-14:40

DNS Graph Mining For Malicious Domain Detection
Hau Tran Xuan, An Nguyen Thanh, Phuong Vo.T.H, and Tu Vu Anh

[slides]

14:40-15:00

Deriving Cyber Use Cases from Graph Projections of Cyber Data Represented as Bipartite Graphs
Mohammed Eslami, George Zheng, Hamed Eramian, and Georgiy Levchuk

[slides]

15:00-15:20

Improving Cyber-Attack Predictions Through Information Foraging
Adam Dalton, Bonnie Dorr, Leon Liang, and Kristy Hollingshead

[slides]

15:20-15:40

Towards a Definition of Cyberspace Tactics, Techniques and Procedures
Fernando Maymi, Robert Bixler, Randolph Jones, and Scott Lathrop

[slides]

15:40-16:00

Binary Malware Image Classification using Machine Learning with Local Binary Pattern
Jhu-sin Luo and Dan Chia-Tien Lo

[slides]

16:00-16:10

Workshop discussion on cybersecurity issues
All participants

 

16:10 –16:30

Coffee Break

 

16:30-16:50

Twitter-Enhanced Android Malware Detection
Jordan DeLoach and Doina Caragea

[slides]

16:50-17:10

Detection of Hacking Behaviors and Communication Patterns on Social Media
Olga Babko-Malaya, Rebecca Cathey, Steve Hinton, David Maimon, and Taissa Gladkova

[slides]

17:10-17:30

On the Relevance of Social Media Platforms in Predicting The Volume and Patterns of Web Defacement Attacks
David Maimon, Andrew Fukuda, Olga Babko-Malaya, Rebecca Cathey, and Steve Hinton

[slides]

17:30-17:50

Sentiment Analysis via Multi-Layer Perceptron Trained by Meta-Heuristic Optimisation
Dabiah Ahmed Alboaneen, Huaglory Tianfield, and Yan Zhang

[slides]

17:50-18:00

Workshop discussion on social media issues
All participants