IDEAS home Printed from https://ideas.repec.org/h/spr/spochp/978-3-319-51500-7_9.html
   My bibliography  Save this book chapter

On Some Information Geometric Approaches to Cyber Security

In: Operations Research, Engineering, and Cyber Security

Author

Listed:
  • C. T. J. Dodson

    (University of Manchester)

Abstract

Various contexts of relevance to cyber security involve the analysis of data that has a statistical character and in some cases the extraction of particular features from datasets of fitted distributions or empirical frequency distributions. Such statistics, for example, may be collected in the automated monitoring of IP-related data during accessing or attempted accessing of web-based resources, or may be triggered through an alert for suspected cyber attacks. Information geometry provides a Riemannian geometric framework in which to study smoothly parametrized families of probability density functions, thereby allowing the use of geometric tools to study statistical features of processes and possibly the representation of features that are associated with attacks. In particular, we can obtain mutual distances among members of the family from a collection of datasets, allowing, for example, measures of departures from Poisson random or uniformity, and discrimination between nearby distributions. Moreover, this allows the representation of large numbers of datasets in a way that respects any topological features in the frequency data and reveals subgroupings in the datasets using dimensionality reduction. Here some results are reported on statistical and information geometric studies concerning pseudorandom sequences, encryption-decryption timing analyses, comparisons of nearby signal distributions and departure from uniformity for evaluating obscuring techniques.

Suggested Citation

  • C. T. J. Dodson, 2017. "On Some Information Geometric Approaches to Cyber Security," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 167-197, Springer.
  • Handle: RePEc:spr:spochp:978-3-319-51500-7_9
    DOI: 10.1007/978-3-319-51500-7_9
    as

    Download full text from publisher

    To our knowledge, this item is not available for download. To find whether it is available, there are three options:
    1. Check below whether another version of this item is available online.
    2. Check on the provider's web page whether it is in fact available.
    3. Perform a search for a similarly titled item that would be available.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:spochp:978-3-319-51500-7_9. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.