Skip to main content
Log in

Context-aware multimodal recommendations of multimedia data in cyber situational awareness

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The current proliferation of large amounts of multimedia data creates an unprecedented challenge for security analysts in the context of Cyber Situational Awareness. Due to this phenomenal growth of multimedia data, security analysts have to invest enormous time and efforts in filtering and correlating multimedia data in order to make informed decisions about identifying and mitigating threats and vulnerabilities. In particular, analysts have to analyze and interpret diverse multimedia network data with varying contexts in order to find the true evidence of cyber attacks. Considering the multimedia nature of cyber security data, we propose a cloud-assisted recommendation system that can identify and retrieve multimedia data of interest based on contextual information and security analysts’ personal preferences. This recommendation system benefits security analysts by establishing a bridge between their personal preferences, the contextual information of their analytical process, and the various types of modality of multimedia data. Evaluation of the proposed system shows evidence that our multimedia recommendation mechanisms promotes cyber threat understanding and risk assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Alhamid M F, Rawashdeh M, Dong H, Hossain M A, Alelaiwi A, El-Saddik A (2016) RecAm: a collaborative context-aware framework for multimedia recommendations in an ambient intelligence environment. Multimedia Syst 22(5):587–601

    Article  Google Scholar 

  2. Chen C C, Huang T C, Park J J, Yen N Y (2015) Real-time smartphone sensing and recommendations towards context-awareness shopping. Multimedia Syst 21(1):61–72

    Article  Google Scholar 

  3. Cuppens F, Miege A (2002) Alert correlation in a cooperative intrusion detection framework. In: Proceedings of the IEEE symposium on security and privacy, pp 202–215

  4. D’Amico, A, Whitley K, Tesone D, O’Brien B, Roth E (2005) Achieving cyber defense situational awareness: a cognitive task analysis of information assurance analysts. In: Proceedings of the human factors and ergonomics society annual meeting, vol 49, no 3. SAGE Publications, pp 229– 233

  5. D’Amico A, Whitley K (2008) The real work of computer network defense analysts. In: VizSEC. Springer, Heidelberg, pp 19–37

  6. Dutt V, Ahn YS, Gonzalez C (2011) Cyber situation awareness: modeling the security analyst in a cyber-attack scenario through instance-based learning. In: Data and applications security and privacy XXV. Springer, Heidelberg, pp 280–292

  7. Gupta S, Gupta BB (2016) XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud. Multimed Tools Appl. doi:10.1007/s11042-016-3735-1

  8. Gupta B, Agrawal D P, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey. doi:10.4018/978-1-5225-0105-3

  9. Hervé D, Wespi A (2001) Aggregation and correlation of intrusion-detection alerts. In: Recent advances in intrusion detection. Springer, Berlin Heidelberg, pp 85–103

  10. Hossain M S, Hossain S K A, Alamri A, Hossain M A (2013) Ant-based service selection framework for a smart home monitoring environment. Multimed Tools Appl 67(2):433–453

    Article  Google Scholar 

  11. Hossain M A, Alamri A, Alhamid M F, Rawashdeh M, Alnusair A (2014) Collaborative recommendation of ambient media services. In: IEEE International Conference on Multimedia and Expo Workshops (ICMEW), pp 1–6

  12. Hossain M S, Muhammad G, Rahman SkMM, Abdul W, Alelaiwi A, Alamri A (2016) Toward end-to-end biometrics-based security for IoT infrastructure. IEEE Wirel Commun Mag 23(5):44–51

    Article  Google Scholar 

  13. Julisch K (2003) Clustering intrusion detection alarms to support root cause analysis. ACM Trans Inf Syst Secur (TISSEC) 6(4):443–471

    Article  Google Scholar 

  14. Killcrece G, Kossakowski K P, Ruefle R, Zajicek M (2003) State of the practice of computer security incident response teams (CSIRTs). No. CMU/SEI-2003-TR-001. Carnegie Mellon University. Pittsburgh, Software Engineering Inst

  15. Kim J, Lee D, Chung K Y (2014) Item recommendation based on context-aware model for personalized u-healthcare service. Multimed Tools Appl 71(2):855–872

    Article  Google Scholar 

  16. Kumar S, Spafford EH (1994) A pattern matching model for misuse intrusion detection. In: Proceedings of the 17th national computer security conference

  17. Mukherjee B, Heberlein L T, Levitt K N (1994) Network intrusion detection. IEEE Netw 8(3):26–41

    Article  Google Scholar 

  18. Pappas N, Popescu-Belis A (2015) Combining content with user preferences for non-fiction multimedia recommendation: a study on TED lectures. Multimed Tools Appl 74(4):1175–1197

    Article  Google Scholar 

  19. Pombinho P, Carmo M B, Afonso A P (2012) Context aware point of interest adaptive recommendation. In: Proceedings of the 2nd workshop on context-awareness in retrieval and recommendation, pp 30–33

  20. Portnoy L, Eskin E, Stolfo SJ (2000), Intrusion detection with unlabeled data using clustering. J Inf Secur. doi:10.4236/jis.2011.24016

  21. Ramezani M (2011) Improving graph-based approaches for personalized tag recommendation. J Emerg Technol Web Intell 3(2):168–176

    Google Scholar 

  22. Rawashdeh M, Alhamid M F, Alja’am J M, Alnusair A, El-Saddik A (2016) Tag-based personalized recommendation in social media services. Multimed Tools Appl 75(21):13299–13315

    Article  Google Scholar 

  23. Rebolloa O, Melladob D, Fernández-Medinac E, Mouratidisd H (2015) Empirical evaluation of a cloud computing information security governance framework. Inf Softw Technol 44–57. doi:10.1016/j.infsof.2014.10.003

  24. Stergiou C, Psannis K E, Kim BG, Gupta B (2016) Secure integration of IoT and Cloud Computing. Future Generation Computer Systems, Elsevier

  25. Tabia K, Benferhat S, Leray P, Mé L (2011) Alert correlation in intrusion detection: combining AI-based approaches for exploiting security operators’ knowledge and preferences. In: Association for the advancement of artificial intelligence, pp 1–8

  26. Wang K, Cretu G, Stolfo SJ (2005) Anomalous payload-based worm detection and signature generation. In: Recent advances in intrusion detection. Springer, Heidelberg, pp 227–246

  27. Wetzker R, Zimmermann C, Bauckhage C, Albayrak S (2010) I tag, you tag: translating tags for advanced user models. In: Proceedings of the 3rd ACM international conference on Web search and data mining, pp 71–80

  28. Zhang Z, Sun R, Zhao C et al (2016) CyVOD: a novel trinity multimedia social network scheme. Multimed Tools Appl. doi:10.1007/s11042-016-4162-z

  29. Zhong C, Yen J, Liu P, Erbacher RF, Etoty R, Garneau C (2015) An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes. In: Proceedings of the 2015 symposium and bootcamp on the science of security. ACM, p 9

  30. Zhong C, Yen J, Liu P, Erbacher R, Etoty R, Garneau C (2015) ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis. In: IEEE international inter-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA), pp 165–171

  31. Zhong C, Yen J, Liu P, Erbacher RF, Etotyv R, Garneau C (2016). Studying analysts data triage operations in cyber defense situational analysis. In: Liu P, Jajodia S, Wang C (eds) Recent advances in Cyber SA. Springer, LNCS vol 10030

Download references

Acknowledgements

The authors are grateful to the Deanship of Scientific Research, King Saud University for supporting through Vice Deanship of Scientific Research Chairs

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Shamim Hossain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alnusair, A., Zhong, C., Rawashdeh, M. et al. Context-aware multimodal recommendations of multimedia data in cyber situational awareness. Multimed Tools Appl 76, 22823–22843 (2017). https://doi.org/10.1007/s11042-017-4681-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4681-2

Keywords

Navigation